POC详情: 772236ccd60950b0922fc989d3191c071813b071

来源
关联漏洞
标题: UNIT4 TETA Mobile SQL注入漏洞 (CVE-2022-27434)
描述:UNIT4 TETA Mobile是UNIT4公司的一个基于网络的应用程序。可在桌面和移动设备(包括智能手机和平板电脑)上使用。 UNIT4 TETA Mobile 29.5.HF17 之前版本存在安全漏洞,该漏洞源于错误报告页面中的 ProfileName 参数包含 SQL 注入漏洞。
描述
UNIT4 TETA Mobile Edition 29HF13 was discovered to contain a SQL injection vulnerability via the ProfileName parameter in the errorReporting page.
介绍
# CVE-2022-27434
UNIT4 TETA Mobile Edition 29HF13 was discovered to contain a SQL injection vulnerability via the ProfileName parameter in the errorReporting page.

The vulnerability exist in the error page generated by the application (in this case: while changing password). 
Adding quotation mark to the ProfileName parameter will generate Oracle database error, meaning that the input is not being sanitized. 

## Request
![sqli_req_marked](https://user-images.githubusercontent.com/63229183/167273315-e93b4bc2-e899-48c2-ab88-65c7d04c12a9.PNG)
## Response
![sqli_resp_marked](https://user-images.githubusercontent.com/63229183/167273322-de289922-a30c-4cd3-bdcd-6e519f72de05.PNG)
## Remediation
The vulnerability already has been reported to the UNIT4 via their service portal. The patch is already available to download (29.5.HF17). 
文件快照

[4.0K] /data/pocs/772236ccd60950b0922fc989d3191c071813b071 └── [ 838] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。