Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Xinghu OA v2.3.2 sensitive information leaked #2

Open
magicwave18 opened this issue Sep 24, 2023 · 1 comment
Open

Xinghu OA v2.3.2 sensitive information leaked #2

magicwave18 opened this issue Sep 24, 2023 · 1 comment

Comments

@magicwave18
Copy link
Owner

1、Access the url to back up the sql file and return success successfully.

task.php?m=sys|runt&a=beifen

图片2

2、Then the sql data will be backed up to upload/data in json format.
图片3

The folder naming format is: current time.random number within 10000
图片4
The specific SQL data file name is: table name_number of fields_number of data rows. The number of fields is fixed in the data table. You only need to explode the number of rows. The number of fields in the admin table is 43, and the number of rows defaults to 8.
图片5
Finally, you need to blast the folder name (1000-9999) and the number of data rows in the OA user table
Then access the corresponding json file to obtain the backed up data, and then obtain the administrator password
图片6

@jzySaber1996
Copy link

CWE-200
Assigned CVE-2023-5296

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants