S4E

Shikongzhiyou ERP Arbitrary File Upload Scanner

Detects 'Arbitrary File Upload' vulnerability in Shikongzhiyou ERP.

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

5 days 15 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

The Shikongzhiyou ERP system is a comprehensive enterprise resource planning solution used by organizations to manage and automate various business processes. This software is typically employed by medium to large enterprises across diverse sectors to enhance operational efficiency. It facilitates essential functions such as finance, human resources, supply chain management, and customer relationship management through a centralized platform. Businesses leverage Shikongzhiyou ERP to streamline workflows, improve data accuracy, and facilitate better decision-making across all departments. The platform's robust architecture and extensive features make it an invaluable tool for companies looking to optimize their enterprise processes. Users of this ERP system appreciate its ability to integrate seamlessly with other applications and scale according to business needs.

The Arbitrary File Upload vulnerability detected in the Shikongzhiyou ERP system poses a significant security risk by allowing attackers to upload malicious files to the server. This type of security flaw can lead to unauthorized file manipulation, potentially enabling attackers to execute arbitrary commands or install harmful software. It exploits the system’s insufficient file validation or sanitization checks during the file upload process. In essence, an attacker can upload a web shell or similarly crafted payload, resulting in server compromise. Organizations using affected versions of this ERP must be vigilant and implement necessary patches or safeguards. Failure to address this vulnerability can lead to unauthorized access and severe data breaches.

The vulnerability resides in the formservice endpoint of the Shikongzhiyou ERP system, where file uploads are processed with inadequate security checks. The specific parameters within this endpoint fail to properly validate the uploaded file types, allowing an attacker to supply crafted file names and contents. This sensitively affects the service parameter of the attachment write functionality within this endpoint. An attacker can successfully upload a file by exploiting the system's lack of stringent verification for file handling mechanisms. Subsequently, this uploaded file can be accessed and executed, leading to further malicious actions on the server. Technical users should perform targeted checks on URL patterns and parameter values to mitigate this risk.

If exploited, this vulnerability can lead to several detrimental effects, notably a complete server takeover by malicious actors. A successful arbitrary file upload can permit the attacker's web shell to execute commands on the compromised server, facilitating unauthorized data access or software installation. This can result in data theft, modification, or destruction, significantly affecting the integrity and confidentiality of company records. Furthermore, such unauthorized server access may allow attackers to pivot and conduct more extensive network attacks, posing a substantial threat to organizational security. The lack of immediate detection capabilities might also prolong the attacker’s presence, exacerbating potential damages.

REFERENCES

Get started to protecting your digital assets