用友某系统漏洞打包可威胁内网

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: getshell可威胁内网 ### 详细说明: 目标地址:http://nczx.yonyou.com/SubModule/Login/index.aspx [<img src="https://images.seebug.org/upload/201510/161618194cfeb75abeabcb49a4cfbcfe808002da.jpg" alt="QQ截图20151016161934.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/161618194cfeb75abeabcb49a4cfbcfe808002da.jpg) 1#帐号弱口令 帐号:liuni 密码:123456 登录系统后,发现功能还是蛮全的 [<img src="https://images.seebug.org/upload/201510/1621571765aa2ef0ef0db88379a3b441efdaeadf.jpg" alt="QQ截图20151016215821.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/1621571765aa2ef0ef0db88379a3b441efdaeadf.jpg) [<img src="https://images.seebug.org/upload/201510/16215738733ed8610e3207d8f0f904c6c972bfb4.jpg" alt="QQ截图20151016215851.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/16215738733ed8610e3207d8f0f904c6c972bfb4.jpg) 在项目绿色通道功能处,发现一个上传点 2#任意文件上传 [<img...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息