### 简要描述: 用友项目管理系统设计不当可以登入获取大量敏感信息 ### 详细说明: 用友产品缺陷管理系统使用了JIRA,对外网开放了后台访问和注册权限,导致可以任意注册用进行登录查看相关项目信息 泄露后台:http://123.103.9.112/login.jsp 注册地址:http://123.103.9.112/secure/Signup!default.jspa ### 漏洞证明: [<img src="https://images.seebug.org/upload/201511/26181801c9da5c3d00bddc1225c8d737a6f0b37c.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201511/26181801c9da5c3d00bddc1225c8d737a6f0b37c.png) [<img src="https://images.seebug.org/upload/201511/2618181001f45814f84519564e0f92bf49cd2a4e.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201511/2618181001f45814f84519564e0f92bf49cd2a4e.png) [<img src="https://images.seebug.org/upload/201511/261818184d29679132955db47c56b635f5a697e7.png" alt="3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201511/261818184d29679132955db47c56b635f5a697e7.png) [<img...
### 简要描述: 用友项目管理系统设计不当可以登入获取大量敏感信息 ### 详细说明: 用友产品缺陷管理系统使用了JIRA,对外网开放了后台访问和注册权限,导致可以任意注册用进行登录查看相关项目信息 泄露后台:http://123.103.9.112/login.jsp 注册地址:http://123.103.9.112/secure/Signup!default.jspa ### 漏洞证明: [<img src="https://images.seebug.org/upload/201511/26181801c9da5c3d00bddc1225c8d737a6f0b37c.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201511/26181801c9da5c3d00bddc1225c8d737a6f0b37c.png) [<img src="https://images.seebug.org/upload/201511/2618181001f45814f84519564e0f92bf49cd2a4e.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201511/2618181001f45814f84519564e0f92bf49cd2a4e.png) [<img src="https://images.seebug.org/upload/201511/261818184d29679132955db47c56b635f5a697e7.png" alt="3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201511/261818184d29679132955db47c56b635f5a697e7.png) [<img src="https://images.seebug.org/upload/201511/26181830c2071cb9bb0a6d1e857b1e9693f7fa8d.png" alt="4.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201511/26181830c2071cb9bb0a6d1e857b1e9693f7fa8d.png)