Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-27434 PoC — UNIT4 TETA Mobile SQL注入漏洞

Source
Associated Vulnerability
Title:UNIT4 TETA Mobile SQL注入漏洞 (CVE-2022-27434)
Description:UNIT4 TETA Mobile是UNIT4公司的一个基于网络的应用程序。可在桌面和移动设备(包括智能手机和平板电脑)上使用。 UNIT4 TETA Mobile 29.5.HF17 之前版本存在安全漏洞,该漏洞源于错误报告页面中的 ProfileName 参数包含 SQL 注入漏洞。
Description
UNIT4 TETA Mobile Edition 29HF13 was discovered to contain a SQL injection vulnerability via the ProfileName parameter in the errorReporting page.
Readme
# CVE-2022-27434
UNIT4 TETA Mobile Edition 29HF13 was discovered to contain a SQL injection vulnerability via the ProfileName parameter in the errorReporting page.

The vulnerability exist in the error page generated by the application (in this case: while changing password). 
Adding quotation mark to the ProfileName parameter will generate Oracle database error, meaning that the input is not being sanitized. 

## Request
![sqli_req_marked](https://user-images.githubusercontent.com/63229183/167273315-e93b4bc2-e899-48c2-ab88-65c7d04c12a9.PNG)
## Response
![sqli_resp_marked](https://user-images.githubusercontent.com/63229183/167273322-de289922-a30c-4cd3-bdcd-6e519f72de05.PNG)
## Remediation
The vulnerability already has been reported to the UNIT4 via their service portal. The patch is already available to download (29.5.HF17). 
File Snapshot

[4.0K] /data/pocs/772236ccd60950b0922fc989d3191c071813b071 └── [ 838] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.