2023 Enterprise WeChat 0day Vulnerability Reappearance and Handling Suggestions

2023 Enterprise WeChat 0day Vulnerability Reappearance and Handling Suggestions

Disclaimer: Do not use the relevant technologies in this article to engage in illegal testing. Any direct or indirect consequences and losses caused by the dissemination and use of the information or tools provided in this article shall be borne by the user himself. Adverse consequences have nothing to do with the article author. This article is for educational purposes only.

1. Vulnerability overview

Vulnerability Number: None

The enterprise WeChat 0day vulnerability can directly obtain sensitive information such as the enterprise WeChat secret without authorization of the /cgi-bin/gateway/agentinfo interface, which can lead to the acquisition of the entire amount of enterprise WeChat data.

Vulnerability hazard

① It can lead to the acquisition of the full amount of corporate WeChat data and documents,

②There are risks such as sending phishing files and links internally by using enterprise WeChat light applications.

insert image description here

2. Affected version

Affected versions: 2.5.x, 2.6.930000 and below

Unaffected: 2.7.x, 2.8.x, 2.9.x;

3. Vulnerability recurrence

FOFA syntax: app="Tencent-Enterprise WeChat"

insert image description here
The access path here is: https://xx.xx.xx.xx/cgi-bin/gateway/agentinfo This access format.
insert image description here

Xiaolong POC detection script:

Xiaolong POC portal: Xiaolong POC tool
insert image description here

4. Comments on rectification

① Wait for the official upgrade. Currently still belongs to 0day

②If the interface is not authorized, sensitive information such as corporate WeChat secrets can be obtained directly, which can lead to the acquisition of the full amount of corporate WeChat data. Temporary risk mitigation measures such as file acquisition and internal force sending of phishing files and links using corporate WeChat light applications are to/ cgi-bin.gateway/agentinfo is blocked on the WAF. For details, please contact the enterprise WeChat team for emergency response. All units are requested to strengthen prevention.

Guess you like

Origin blog.csdn.net/holyxp/article/details/132264915