A record of the mining method for a CNVD certificate

0 23
Background of vulnerability miningWandered around Fofa and suddenly saw a certai...

Background of vulnerability mining

Wandered around Fofa and suddenly saw a certain system, curious, so I clicked on it

Steps for vulnerability discovery and exploitation

A record of the mining method for a CNVD certificate

The ids are 5 and 4 (to be mentioned later)

admin123456/Liuyichen123

admin1234567/Liuyichen123

1735726373_67751525a5b4557d0039c.png!small?1735726374713


  • Modify the password, enter the password to be modified

For example, 'Liuyichen123!', then capture the packet and click save

1735726396_6775153cf4219c1b9058e.png!small?1735726397896

Unauthorized operation

Change the id to 4 (the id is based on the order of user creation) and change the name to the user's name

1735726452_67751574d65f777d698b7.png!small?1735726454105


Modification successful

1735726463_6775157fee1b99c7feef4.png!small?1735726464855

Log in with 'admin123456/Liuyichen123!'

1735726479_6775158fa8f06c5c9fcf2.png!small?1735726480596

Successfully logged in and modified someone else's password without authorization

Let's take a look at the homepage

1735726494_6775159ef031398ec5c3e.png!small?1735726495906


  • I found that there are 5 users, so I guess that the user with id=1 must be the administrator
  • Attempted to register an account with the username 'admin', only to find that 'admin' already exists, and it is indicated that there is an account with id=1 and loginname='admin'
  • ThenOver authorizationModify the administrator account

The same operation

1735726528_677515c0611d69301eb49.png!small?1735726529386

Click Save


1735726965_67751775f0307d0b7a8d6.png!small?1735726966908

Enter the background

The administrator account password was successfully changed to admin/Liuyichen123!

Successfully entered the background

1735726548_677515d4387bbc2e451ed.png!small?1735726549156


1735726626_67751622c66dd5dcd90e2.png!small?1735726627875


Then search for fingerprints on fofa and find the same CMS. Obtain a general certificate

After a month of waiting, the archiving was successful

1735726820_677516e4d370541c35be5.png!small?1735726821776

Summary:

  • Vulnerability Type: Authorization vulnerability. Users can modify or access data or permissions of other users (including administrators).
  • Vulnerability Cause:
    • The system does not fully verify the permissions of user requests.
    • Sensitive information such as user ID is not encrypted or not fully verified in the request.
  • Vulnerability Impact:
    • This may lead to serious consequences such as data leakage and data tampering.
    • Attackers can obtain administrative privileges and perform arbitrary operations on the entire system.
你可能想看:

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

2.8 Continue to click the getTomcatWebServer method, find the initialize () method, and you can see the tomcat.start () method to start the Tomcat service.

Is the validity period of code signing certificates the same as that of SSL certificates, which is 1 year?

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

Dynamic CNN model for identifying fake personal profiles in online social networks

0x05 It is generally not recommended to do leaf certificate site certificate locking

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

(3) Is the national secret OTP simply replacing the SHA series hash algorithms with the SM3 algorithm, and becoming the national secret version of HOTP and TOTP according to the adopted dynamic factor

最后修改时间:
admin
上一篇 2025年03月26日 15:38
下一篇 2025年03月26日 16:01

评论已关闭