Spring Cloud Environment: CVE-2022-28525 (file upload vulnerability)

Table of contents

1. Topic

1. Login 

2. Burp captures packets and changes packets 

3. Ant sword obtains flag 


1. Topic

fa5997b30221485b83bccff11a5dead9.png

 ED01CMSv20180505 has an arbitrary file upload vulnerability

d76a7dde293e4391bc76ed4f11e42849.png

English is not enough to translate to make up:

34ecb11086584b7d91dcf05ebdfd1758.png Clicking on other pages will result in Not Found:

0edece7f50c444c98f3fa4bfa17294f0.png

 Log in first to see:

Try the universal password: admin: 123

Found the error:

ce9ce3967f8d4191af11a39fffc5e65d.png

1. Login 

admin: admin

Successfully logged in:

938e268550f34f4d9f669966a4c17db6.png

Localize it: 

a3c999db2d2e43c3be20a2ed1f9ad9be.png psots can be added:

48366bf40c3c4b61a042ae77eb8d8223.png

 The result of uploading the php Trojan was unsuccessful:

It seems that uploading files other than images is not allowed:

f13c115040d64453b824fcacd004d28a.png

Packet capture modification: 

8dbbe3a208b14a5aa37cae72d002bedb.png

 jpg to php

e34bb976f44c45e49208c2f243358eb9.png It still fails, maybe it's not authorized.

ec336b2b50fc466ba949ecf91f779013.png

find next:

The users user module can add:

5cd13fe9deba4636af457da4e761b90f.png

Try uploading jpg:

fa5a762261064a8ca2f256ed6b9a9b8e.png

successfully uploaded:

e48bdceb288145e89d64bcaa841aada4.png

 Find the jpg pictures we uploaded:

385843ec54f44f04812cf9d0146fa73f.png

2. Burp captures packets and changes packets 

Burp captures packets: 

1ba2a70fc93640b2949dd0004314974b.png Replayer mod:

The picture jpg is changed to php format, and a Trojan horse is written inside:

620b0785d3c147d68488509eec66f7f5.png

In the website directory xxx/images, you can see the file we just uploaded: 

f9b2a12f3722467ab1dfe79816de04b4.png

3. Ant sword obtains flag 

Go directly to Ant Sword:

2f8133da06d5480ba1cf57f6303136cb.png

 As shown in the picture:

45eb89b211a749148f2bcc5d52f71c30.png

Find the flag in the root directory:

1885f21945be406ea09db0398f769d97.png

View flags:

9545a1e1ccb8416aab84dd3b80957be4.png

flag{eef2667a-4c3c-4b61-b816-4b883c32e4ac}

Guess you like

Origin blog.csdn.net/m0_65712192/article/details/130233976