REF: https://github.com/luelueking/RuoYi-v4.7.8-RCE-POC
The system had vulnerabilities in the scheduled tasks before, and now I bypass it.
Sqli
In the patch, a strategy using blacklisting and whitelisting was employed.
However, I managed to bypass it by using a whitelist class and successfully carried out an SQL injection.
success to change the data of table job_id
RCE
JobInvokeUtil
does not allow parentheses in the string during
invocation, so I modified the parameter value of a specific job in the
original job table to hexadecimal (bypassing defense detection),
enabling another scheduled task for Remote Code Execution (RCE).
the job’s invoke_target changed
and then execute!