An ssl vpn entry in the bianfeng network can be controlled to hijack the password (success stories)
The ssl vpn entry custom framework has a security vulnerability in implementation. unauthenticated remote attackers can exploit this vulnerability to modify the Clientless ssl vpn entry content, this vulnerability may cause credential theft, cross-site scripting, and other attacks. This vulnerability is due to the failure to correctly implement the authentication check in the Custom framework of the Clientless ssl vpn entry.
Https: // 221.12.20.182/+ CSCOE +/portal.html
Specific vulnerability details, see: http://www.bkjia.com/Article/201411/349295.html
You can insert malicious code in the title or other places on the interface to steal the account and password entered by the user and the current cookie information of the user after login. Once the vpn entry is attacked by hackers, the consequences are unimaginable, which may lead to the fall of the Intranet. Once the customer information is leaked, the loss will not be estimated. Due to the vulnerability test, you accidentally modified your main interface and hoped to include it, security is the first priority. I hope you can fix it as soon as possible to reduce losses.
Execute the exploitation Program
I used the password stealing script and got several accounts and passwords after several minutes. The danger of this vulnerability is shown in the figure below:
As a white hat is only used for testing purposes. I have obtained three account passwords, and no clients have been connected to your intranet. I hope you can fix them quickly without further penetration. The consequences are very serious.
Below are several account passwords
2015-03-19 10:24:38 referer:https://webvpn.bianfeng.com/+CSCOE+/logon.html patt/:tgroup=&next=&tgcookieset=&group_list=forbfpolicy_tunnel&username=liubing02&password=1wxgameI8&Login=Login2015-03-19 10:37:50 referer:https://webvpn.bianfeng.com/+CSCOE+/logon.html patt/:tgroup=&next=&tgcookieset=&group_list=forbfpolicy_tunnel&username=v.daimin&password=2PMxm0909&Login=Login2015-03-19 10:42:25 referer:https://webvpn.bianfeng.com/+CSCOE+/logon.html patt/:tgroup=&next=&tgcookieset=&group_list=forbfpolicy_tunnel&username=dongjie&password=Lilu%26789&Login=Login
I don't want to handle the password. I don't think wooyun reviewers will do that. I hope the above users can change the password as soon as possible.
Do you have a gift?
Solution:
Install official patches.