Direct one-click installation can be started, and then login on the account admin password 1111111, login if prompted authentication expired can not log in, change the local system time can
Download a good local idea to open a static look at the code on
idea
Download: http://partner.yimihome.com/static/index.html#/index/idea_deploy First set it up as shown here, after setting it up, import the database, after importing, you need to change the link configuration yimioa/c-core/src/main/ resources/application.properties Modify the mysql connection information, and then just start But idea start, more bugs, and report more errors, here is idea static look at the code
Did not find the corresponding web function point, here is a direct look at the static code interface audit
orderby, here the parameters, and then look down, because the above personnel function point that GET injection already know getModuleListSqlAndUrlStr method, so look down, directly orderby passed in So it causes SQL injection, if not bypass, there will be no problem, after all, the filter method has been bypassed.
The text was updated successfully, but these errors were encountered:
Environment construction
http://partner.yimihome.com/static/index.html#/index/sys_env
Direct one-click installation can be started, and then login on the account admin password 1111111, login if prompted authentication expired can not log in, change the local system time can
http://172.16.140.189:8088/oa/setup/license.jsp
Once installed here, the source code is available for download at gitee
https://gitee.com/bestfeng/yimioa
Download a good local idea to open a static look at the code on
idea
Download: http://partner.yimihome.com/static/index.html#/index/idea_deploy First set it up as shown here, after setting it up, import the database, after importing, you need to change the link configuration yimioa/c-core/src/main/ resources/application.properties Modify the mysql connection information, and then just start
But idea start, more bugs, and report more errors, here is idea static look at the code
/oa/visual/exportExcel.do interface orderby injection Bypass
Vulnerability recurrence
bypass poc
Code audit and function implementation
Did not find the corresponding web function point, here is a direct look at the static code interface audit

So it causes SQL injection, if not bypass, there will be no problem, after all, the filter method has been bypassed.
orderby, here the parameters, and then look down, because the above personnel function point that GET injection already know
getModuleListSqlAndUrlStrmethod, so look down, directly orderby passed inThe text was updated successfully, but these errors were encountered: