minor-update

patch-4
Dhiyaneshwaran 2024-07-10 16:57:31 +05:30 committed by GitHub
parent 948844c407
commit e7fb3f4d4e
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 6 additions and 1 deletions

View File

@ -5,11 +5,15 @@ info:
author: securityforeveryone
severity: high
description: |
EnjoyRMIS is vulnerable to a SQL injection in the GetOAById SOAP endpoint. An attacker can exploit this to execute arbitrary SQL commands.
EnjoyRMIS GetOAById has a SQL injection vulnerability, through which an attacker can obtain sensitive database information and even control the server.
reference:
- https://github.com/wy876/POC/blob/main/EnjoyRMIS-GetOAById%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
metadata:
fofa-query: body="CheckSilverlightInstalled"
verified: true
max-request: 1
tags: enjoyrmis,sqli
http:
- raw:
- |
@ -31,5 +35,6 @@ http:
- type: dsl
dsl:
- 'contains(body,"qqqzq1qvkqq")'
- 'contains(header,"text/xml")'
- 'status_code == 500'
condition: and