用友软件协作办公平台多处漏洞(SQL注入漏洞、越权查看敏感信息)

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: RT ### 详细说明: 谷歌关键字: intitle:"fe协作" 注入点: witapprovemanage\report\staffleaveana.jsp?userid=* ``` <%@ page contentType="text/html; charset=GBK" language="java" errorPage="" %> <jsp:directive.page import="fe.sys.User"/> <jsp:directive.page import="fe.res.ResourceManage"/> <jsp:directive.page import="fe.util.HtmlFormat"/> <jsp:directive.page import="fe.dao.DataTable"/> <jsp:directive.page import="fe.dao.FieldSet"/> <jsp:directive.page import="java.util.Date"/> <jsp:directive.page import="java.util.Map"/> <jsp:directive.page import="fe.datapool.DataPool"/> <jsp:directive.page import="fe.witmanage.service.WitResource"/> <%@ taglib uri='/WEB-INF/tags/fe.tld' prefix='f'%> <% String userid = request.getParameter("userid");//未过滤 Map mapStat= null; if (!(userid == null || "".equals(userid))){ WitResource witResource=(WitResource)ResourceManage.getContext("witResource"); mapStat = witResource.analysisStaffLeave(userid);//带入查询 } %> ``` ### 漏洞证明:...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息