用友致远A6协同管理高危漏洞二

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: 用友致远A6协同管理高危漏洞二 ### 详细说明: 该漏洞泄露了当前登录用户(所有登录的)的SessionID; 利用泄露的SessionID即可登录该用户,包括管理员,进入后getshell毫无压力 /yyoa/ext/https/getSessionList.jsp 部分代码 ``` <%@ page contentType="text/html;charset=GBK"%> <%@ page session= "false" %> <%@ page import="net.btdz.oa.ext.https.*"%> <% String reqType = request.getParameter("cmd"); String outXML = ""; boolean allowHttps = true; if("allowHttps".equalsIgnoreCase(reqType)){ //add code to judge whether it allow https or not allowHttps = FetchSessionList.checkHttps(); if (allowHttps) response.setHeader("AllowHttps","1"); } if("getAll".equalsIgnoreCase(reqType)){ outXML = FetchSessionList.getXMLAll(); } else if("getSingle".equalsIgnoreCase(reqType)){ String sessionId = request.getParameter("ssid"); if(sessionId != null){ outXML = FetchSessionList.getXMLBySessionId(sessionId); } } else{ outXML += "<?xml version=\"1.0\" encoding=\"GB2312\"?>\r\n"; outXML += "<SessionList>\r\n"; //outXML += "<Session>\r\n"; //outXML += "</Session>\r\n"; outXML +=...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息