CVE-2023-51906

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on yonyou YonBIP systems by sending a crafted script to the ServiceDispatcherServlet component. It affects yonyou YonBIP v3_23.05 installations, potentially compromising entire enterprise systems.

💻 Affected Systems

Products:
  • yonyou YonBIP
Versions: v3_23.05
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the uap.framework.rc.itf.IResourceManager component via ServiceDispatcherServlet

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Remote code execution leading to data theft, system compromise, and potential business disruption.

🟢

If Mitigated

Limited impact with proper network segmentation, WAF rules, and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub, exploitation appears straightforward

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.yonyou.com/

Restart Required: No

Instructions:

Check vendor website for security updates and apply any available patches immediately

🔧 Temporary Workarounds

Network Access Control

linux

Restrict access to ServiceDispatcherServlet endpoints

iptables -A INPUT -p tcp --dport [YonBIP_PORT] -s [TRUSTED_IPS] -j ACCEPT
iptables -A INPUT -p tcp --dport [YonBIP_PORT] -j DROP

Web Application Firewall Rules

all

Block malicious requests to vulnerable endpoints

WAF rule: Block requests containing suspicious patterns to /ServiceDispatcherServlet

🧯 If You Can't Patch

  • Isolate affected systems from internet and restrict internal network access
  • Implement strict monitoring and alerting for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if system is running YonBIP v3_23.05 and has ServiceDispatcherServlet accessible

Check Version:

Check application version in admin interface or configuration files

Verify Fix Applied:

Verify version has been updated beyond v3_23.05 or test for vulnerability using safe methods

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to ServiceDispatcherServlet
  • Suspicious script execution patterns
  • Unexpected process creation

Network Indicators:

  • HTTP requests to /ServiceDispatcherServlet with crafted payloads
  • Outbound connections from YonBIP to unknown destinations

SIEM Query:

source="YonBIP" AND (uri="*ServiceDispatcherServlet*" AND (payload="*script*" OR payload="*exec*"))

🔗 References

📤 Share & Export