当前位置:网站首页>pikachu Over permission
pikachu Over permission
2022-08-03 22:09:00 【narukuuuu】
Simple record
Horizontal override
Also known as horizontal override, it means
different users with the same authority can access each other, for example, A and B are users with the same authority, if A can see what theoretically only B can seeinformation, or A can perform operations that theoretically only B can perform, this is horizontal overreach.
Topic presentation
Open the title to see, it is a login interface
Click on the prompt, find the login information for three accounts, log in to one of the accounts randomly and click to view personal information
You can find that Url can pass the username as a parameter, try to modify it to other username, and find that it can be echoed successfully, and the authority is successfully exceeded
reason

It only judges whether you are logged in and not using session to calibratetest
Checking the check_op_login function in function.php just judges whether ['op']['username'] or ['op']['password'] is defined 
Check the code of the login page and find that all usernames will be defined after login ['op']['username'] and ['op']['password']
while inThe interface for viewing information only determines whether it is logged in and not which user it is
Vertical override
Also known as vertical override, it means that users with lower permissions can access users with higher permissions.For example, user A has lower authority than B. If A can access resources that theoretically only B can access, or perform operations that theoretically can only be performed by B, that is vertical override.
Topic presentation
pikachu user only has view permission
super user adminPermission to modify user information and add users
use adminThe user adds a new user test1, pay attention to the url at this time
Open another browser to log in to the ordinary user pikachu and try to directly copy the admin user's add user URL to add users (unauthorized access)
After adding the user as the ordinary user pikachu, I found that the login interface was returned, but re-login the user and check the user information to find that the user just added has been added successfully
Log in as pikachu user and capture packets and cookie values
Log in to the administrator account to add user test3, and capture packets together, replace the original cookie value with the pikachu user's cookie value, and re-Send package
You can see that there are two test3, one isThe test3 user added by the admin user, one is added by replaying the admin data package
reason
Theop2_login.php page judges the level of the logged-in users to determine which page they enter
op2_user.php only determines whether to log in
The check_op2_login function in the function is the same as check_op1_login, but only determines whether the variable is defined
op2_admin.php On this page, the login and level level judgments are made, so after logging in to the pikachu user, accessing the admin.php page will directly jump to the login page
The page for adding users op2_admin_edit.php only verifies whether the user is logged in, if not, it will jumpOn the login page, the user permission level is not verified, but the front end shows that adding a user is an operation that can only be performed by a user with a permission level of 1, so there is a vertical unauthorized vulnerability.
Reference article:
https://blog.csdn.net/elephantxiang/article/details/113480084
https://blog.csdn.net/qq_37077262/article/details/103025989
边栏推荐
- What is the role and difference between buildscript and allprojects?
- 如何基于WPF写一款数据库文档管理工具(二)
- JPA Native Query(本地查询)及查询结果转换
- for循环练习题
- Soft exam system analysts note experience sharing: theory of protracted war
- 382. Linked List Random Node
- 易基因|RNA m5C甲基化测序(RNA-BS)技术介绍
- 【刷题篇】二叉树的右视图
- 2022年全国职业院校技能大赛网络安全 B模块 B-1任务一:主机发现与信息收集 国赛原题
- D - Project Planning--二分
猜你喜欢

LyScript 实现应用层钩子扫描器

超级实用网站+公众号合集

CAS:122567-66-2_DSPE-Biotin_DSPE-Biotin
![[kali-vulnerability scanning] (2.1) Nessus lifts IP restrictions, scans quickly without results, and plugins are deleted (middle)](/img/93/0b78b6a930380aeecfbbb156df7498.png)
[kali-vulnerability scanning] (2.1) Nessus lifts IP restrictions, scans quickly without results, and plugins are deleted (middle)

Flutter 桌面探索 | 自定义可拖拽导航栏

shell编程基础

CAS: 773888-45-2_BIOTIN ALKYNE_生物素-炔基

CAS:153162-70-0_N-BOC-6-生物素酰氨基己胺

Nacos配置文件管理、微服务获取Nacos配置文件

Diazo Biotin-PEG3-DBCO|重氮化合物修饰生物素-三聚乙二醇-二苯并环辛炔
随机推荐
上课笔记(6)(1)——#629. 表达式括号匹配(stack)
PowerMockup 4.3.4::::Crack
LyScript 实现应用层钩子扫描器
LVS负载均衡集群
七夕快乐!
封装、包、访问权限修饰符、static变量
LabVIEW代码生成错误 61056
CAS:908007-17-0_Biotin-azide_Biotin azide
如何设计 DAO 的 PoW 评判标准 并平衡不可能三角
CAS:122567-66-2_DSPE-生物素_DSPE-Biotin
函数,递归以及dom简单操作
距LiveVideoStackCon 2022 上海站开幕还有3天!
HCIP第十六天
HDU 5655 CA Loves Stick
Unification of east-west and north-south communications
AI首席架构师13-AICA-智能文档分析技术在行业场景中的应用
Data_web(八)mysql增量同步到mongodb
template string
CAS:1797415-74-7_TAMRA-Azide-PEG-Biotin
基于支持向量机的网络⼊侵检测系统的全面调查和分类