CodeNewbie Community 🌱

Sharon428931
Sharon428931

Posted on

SQL Injection Risk in Yonyou GRP-U8: Patch Released

> About Author
Hi, I'm Sharon, a product manager at Chaitin Tech. We build SafeLine, an open-source Web Application Firewall built for real-world threats. While SafeLine focuses on HTTP-layer protection, our emergency response center monitors and responds to RCE and authentication vulnerabilities across the stack to help developers stay safe.

Yonyou GRP-U8 is a well-known enterprise management platform widely used in large organizations for finance, procurement, inventory, and production workflows.

Recently, Yonyou received a security report and quickly released a patch to fix a front-end SQL injection vulnerability affecting multiple GRP-U8 product lines. To raise awareness and speed up mitigation, Yonyou and Chaitin Tech jointly issued a risk advisory.

Chaitin’s security products now fully support detection and scanning for this vulnerability. The emergency response team has also developed safe PoC tools for both remote and local detection, available for public download.


Vulnerability Overview

The flaw exists because GRP-U8 fails to properly sanitize user input, directly embedding it into SQL queries. This leads to a classic SQL injection risk that could allow attackers to access or manipulate backend data.


Detection Tools

1. X-POC Remote Scanner

Example usage:

xpoc -r 409 -t https://xpoc.org
Enter fullscreen mode Exit fullscreen mode

Download links:

2. CloudWalker Local Scanner

Example usage (Windows):

yonyou_grp_u8_sqli_ct_893849_scanner_windows_amd64.exe
Enter fullscreen mode Exit fullscreen mode

Download: https://stack.chaitin.com/tool/detail/1232


Affected Versions

  • Yonyou GRP-U8 U8Manager product lines B, C, and G

Mitigation and Fix

Temporary Workaround:
Restrict access to the application using network ACLs or firewalls, allowing only trusted IP ranges.

Permanent Fix:
Yonyou has released official patches. Download and apply them here:
https://security.yonyou.com/#/noticeInfo?id=379


Product Support

  • YunTu: Built-in fingerprinting and PoC detection
  • DongJian: Custom PoC support
  • SafeLine WAF: Detects and blocks exploitation attempts by default
  • QuanXi: Default detection support
  • CloudWalker: Users on platform v23.05.001+ can update the emergency vulnerability library (EMERVULN-23.09.021_r1) for scanning. Others should contact support.

Timeline

  • Sep 20: Yonyou released patch and advisory
  • Sep 21: Chaitin emergency lab analyzed and reproduced the issue
  • Sep 22: Joint advisory published by Yonyou and Chaitin

References


Join the SafeLine Community

If you continue to experience issues, feel free to contact SafeLine support for further assistance.

Top comments (0)