edusrc漏洞挖掘第八天|我一眼就看出你这响应不对劲

admin 2023年6月13日11:35:51评论101 views字数 2949阅读9分49秒阅读模式
edusrc漏洞挖掘第八天|我一眼就看出你这响应不对劲


作者:辛巴大佬


前面几天的内容:


edusrc漏洞挖掘第一天|403带来的漏洞


edusrc漏洞挖掘第二天|快速探测资产弱点


edusrc漏洞挖掘第三天|那些不被认可的信息泄露


edusrc漏洞挖掘第四天|反手一个标签


edusrc漏洞挖掘第五天|无中生有


edusrc漏洞挖掘第六天|我一眼就看出你这请求不对劲


edusrc漏洞挖掘第七天|剑走偏锋



今天是edusrc漏洞挖掘第八天,还是老规矩。继续对edusrc排名第一的伤害交通大学进行漏洞挖掘。


edusrc漏洞挖掘第八天|我一眼就看出你这响应不对劲


在进行资产探测的时候,发现一个资产地址,如果点击访问会跳转到jc统一登录地址,通过路径扫描发现还有一个校外用户登录页面。


edusrc漏洞挖掘第八天|我一眼就看出你这响应不对劲


在点击登陆的时候,有个请求的接口地址让我觉得可能会存在问题:


数据包如下:


POST /ums/ums/getRole HTTP/1.1Host: user.xxxxxxx.sjtu.edu.cnAccept: application/json, text/plain, */*Accept-Encoding: gzip, deflate, brAccept-Language: zh-CN,zh;q=0.9Content-Length: 0Origin: https://user.xxxxxxx.sjtu.edu.cnReferer: https://user.xxxxxxx.sjtu.edu.cn/ums/user/index.htmlSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: same-originUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="112", "Google Chrome";v="112", "Not:A-Brand";v="99"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "macOS"


响应包返回了数据内容:


HTTP/1.1 200 OKAccess-Control-Allow-Credentials: trueAccess-Control-Allow-Credentials: falseAccess-Control-Allow-Headers: X-Requested-With,Content-TypeAccess-Control-Allow-Methods: PUT,POST,GET,DELETE,OPTIONSAccess-Control-Allow-Origin: https://user.xxxxxxx.sjtu.edu.cnConnection: keep-aliveContent-Type: application/json; charset=utf-8Date: Tue, 07 Feb 2023 10:40:42 GMTEtag: W/"4d4-d17bqK52VNY2JQ4ODTzgbhOimVQ"Server: nginxStrict-Transport-Security: max-age=31536000; includeSubDomainsX-Content-Type-Options: nosniffX-Frame-Options: SAMEORIGINX-Nginx-Debug-Variables: host:user.xxxxxxx.sjtu.edu.cn,request_uri:/ums/ums/getRole,X-Powered-By: ExpressX-Xss-Protection: 1; mode=blockContent-Length: 2721
{ "code": 100, "msg": "请求成功", "extend": { "returnMsg": [ { "roleId": "10", "name": "用户联络员", "energyValid": "0", "imsValid": "0", "meetingValid": "1", "visitorValid": "1", "limsValid": "1", "param01": null, "param02": "1", "param03": "3" }, { "roleId": "11", "name": "运行管理员", "energyValid": "1", "imsValid": "1", "meetingValid": "1", "visitorValid": "1", "limsValid": "1", "param01": null, "param02": "2", "param03": "1" }, { "roleId": "13", "name": "系统管理员", "energyValid": "1", "imsValid": "1", "meetingValid": "1", "visitorValid": "1", "limsValid": "1", "param01": null, "param02": "3", "param03": "1" }, { "roleId": "3", "name": "物业管理员", "energyValid": "1", "imsValid": "0", "meetingValid": "1", "visitorValid": "1", "limsValid": "1", "param01": null, "param02": "4", "param03": "2" }, { "roleId": "7", "name": "全校老师", "energyValid": "0", "imsValid": "0", "meetingValid": "1", "visitorValid": "0", "limsValid": "0", "param01": null, "param02": "5", "param03": "1" }, { "roleId": "8", "name": "全校学生", "energyValid": "0", "imsValid": "0", "meetingValid": "0", "visitorValid": "0", "limsValid": "0", "param01": null, "param02": "6", "param03": "1" }, { "roleId": "9", "name": "用户", "energyValid": "0", "imsValid": "0", "meetingValid": "1", "visitorValid": "1", "limsValid": "1", "param01": null, "param02": "7", "param03": "3" } ] }}


POST /ums/ums/getRole的getRole进行fuzz


最后发现接口信息泄漏:


edusrc漏洞挖掘第八天|我一眼就看出你这响应不对劲


看见了信息,但是没有看见管理员密码,又fuzz出来一个参数:adminlist


edusrc漏洞挖掘第八天|我一眼就看出你这响应不对劲


三个密码都没解出来,最后给了4分


edusrc漏洞挖掘第八天|我一眼就看出你这响应不对劲





edusrc漏洞挖掘第八天|我一眼就看出你这响应不对劲



写在最后,漏挖掘交流群满四百人了,想加入的加我微信拉:


微信号:hkxinba


里面提供交大资产,和漏洞挖掘交流,有兴趣的一定要加入!



原文始发于微信公众号(绿帽子安全团队):edusrc漏洞挖掘第八天|我一眼就看出你这响应不对劲

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2023年6月13日11:35:51
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   edusrc漏洞挖掘第八天|我一眼就看出你这响应不对劲https://cn-sec.com/archives/1799707.html

发表评论

匿名网友 填写信息