Skip to content

Latest commit

 

History

History
39 lines (21 loc) · 1.61 KB

sql.md

File metadata and controls

39 lines (21 loc) · 1.61 KB

SQL injection exists in the ibos office OA. Procedure

official website:http://www.ibos.com.cn/

version:4.5.5

POC

Route: r=weibo/comment/addcomment

The injection parameter touid exists

Successfully burst the database name by reporting an error injection

WPS图片(1)

The addComment() method under the model layer is invoked through the actionAddComment() method.

WPS图片(2)

addComment() then calls the addComment() method under the parent class WPS图片(3)

The addComment() method receives the uploaded parameters as an array via post

WPS图片(4)

Following the above branch, data[] is brought directly into the addComment() method

WPS图片(5)

There is the escapeData() security check, but the touid parameter passed in here is not intval(), for unknown reasons

WPS图片(6)

Finally, the data is brought to the fetchRealnameByUid() method in the model layer to execute the SQL statement

WPS图片(7) WPS图片(8)