漏洞描述 Wanhu ezOFFICE是中国万户(Wanhu)公司的一款全面的办公套件软件。 Wanhu ezOFFICE 11.1.0版本存在SQL注入漏洞,该漏洞源于defaultroot/platform/bpm/work_flow/operate/wf_printnum.jsp 中包含一些未知处理,通过参数 recordId导致SQL注入。
相关漏洞推荐 POC 万户ezOFFICE协同管理平台 /defaultroot/modules/govoffice/gov_documentmanager/receivefile_gd.jsp;.js SQL 注入漏洞 万户ezOFFICE协同管理平台 /defaultroot/platform/custom/customizecenter/js/getAutoCode.jsp;.js SQL 注入漏洞 万户ezOFFICE协同平台 /defaultroot/iWebOfficeSign/OfficeServer.jsp/../../modules/hrm/report/customize/checkSQL_httprequest.jsp SQL 注入漏洞 万户 ezOFFICE WeiXin!callback.action XXE漏洞 万户 ezOFFICE /defaultroot/wpsservlet loadFile 文件读取漏洞(CNVD-2021-76461) 万户 ezOFFICE /defaultroot/platform/report/graphreport/graph_include.jsp SQL 注入漏洞 Wanhu ezOFFICE /defaultroot/platform/bpm/work_flow/operate/wf_printnum.jsp;.js SQL 注入漏洞(CVE-2024-1012) POC wanhu-documentedit-sqli: WanhuOA DocumentEdit.jsp - SQL Injection POC wanhu-download-ftp-file-read: Wanhu OA download_ftp.jsp - Arbitrary File Read POC wanhu-download-old-file-read: Wanhu OA download_old.jsp - Arbitrary File Read POC wanhu-oa-fileupload-controller: Wanhu OA Fileupload Controller - Arbitrary File Upload POC wanhu-teleconferenceservice-xxe: Wanhu OA TeleConferenceService Interface - XML External Entity Injection POC wanhuoa-downloadservlet-lfi: Wanhu OA DownloadServlet - Remote File Disclosure