CVE-2021-3019 [Reproduction of Lanproxy arbitrary file read vulnerability]

Introduction

Lanproxy is an intranet penetration tool that proxies LAN personal computers and servers to the public network. Currently, it only supports tcp traffic forwarding, and can support any tcp upper layer protocol (access to intranet websites, local payment interface debugging, ssh access, remote desktop... ). At present, there are peanut shell, TeamViewer, GoToMyCloud, etc. on the market that provide similar services, but to use a third-party public network server, you must pay for the third party, and these services have various restrictions. In addition, due to the data package It will flow through a third party, so it is also a major hidden danger to data security.

Affected version

lanproxy 0.1

Vulnerability overview

This Lanproxy path traversal vulnerability (CVE-2021-3019) reads arbitrary files through .../bypass.

This vulnerability allows directory traversal to read /.../conf/config.properties to obtain credentials for intranet connection.

Environment setup

Download the lanproxy installation package:
https://file.nioee.com/d/2e81550ebdbd416c933f/

Insert picture description here
After the download is complete, unzip it to the /usr/local/ directory:
Insert picture description here
execute the commands in turn, access the ip address: 8090:
Insert picture description here

Vulnerability recurrence:

Use burpsuite to capture packets and trigger the vulnerability at the url:
configuration file:/../conf/config.properties

Insert picture description here
View /etc/passwd:
/../../../../etc/passwd
Insert picture description here

Guess you like

Origin blog.csdn.net/qq_45742511/article/details/115008836