当前位置:网站首页>pikachu Over permission
pikachu Over permission
2022-08-03 22:09:00 【narukuuuu】
Simple record
Horizontal override
Also known as horizontal override, it means
different users with the same authority can access each other
, for example, A and B are users with the same authority, if A can see what theoretically only B can seeinformation, or A can perform operations that theoretically only B can perform, this is horizontal overreach.
Topic presentation
Open the title to see, it is a login interface
Click on the prompt, find the login information for three accounts, log in to one of the accounts randomly and click to view personal information
You can find that Url can pass the username as a parameter, try to modify it to other username, and find that it can be echoed successfully, and the authority is successfully exceeded
reason
It only judges whether you are logged in and not using session to calibratetest
Checking the check_op_login function in function.php just judges whether ['op']['username'] or ['op']['password'] is defined
Check the code of the login page and find that all usernames will be defined after login ['op']['username'] and ['op']['password']
while inThe interface for viewing information only determines whether it is logged in and not which user it is
Vertical override
Also known as vertical override, it means that users with lower permissions can access users with higher permissions.For example, user A has lower authority than B. If A can access resources that theoretically only B can access, or perform operations that theoretically can only be performed by B, that is vertical override.
Topic presentation
pikachu user only has view permission
super user adminPermission to modify user information and add users
use adminThe user adds a new user test1, pay attention to the url at this time
Open another browser to log in to the ordinary user pikachu and try to directly copy the admin user's add user URL to add users (unauthorized access)
After adding the user as the ordinary user pikachu, I found that the login interface was returned, but re-login the user and check the user information to find that the user just added has been added successfully
Log in as pikachu user and capture packets and cookie values
Log in to the administrator account to add user test3, and capture packets together, replace the original cookie value with the pikachu user's cookie value, and re-Send package
You can see that there are two test3, one isThe test3 user added by the admin user, one is added by replaying the admin data package
reason
Theop2_login.php page judges the level of the logged-in users to determine which page they enter
op2_user.php only determines whether to log in
The check_op2_login function in the function is the same as check_op1_login, but only determines whether the variable is defined
op2_admin.php On this page, the login and level level judgments are made, so after logging in to the pikachu user, accessing the admin.php page will directly jump to the login page
The page for adding users op2_admin_edit.php only verifies whether the user is logged in, if not, it will jumpOn the login page, the user permission level is not verified, but the front end shows that adding a user is an operation that can only be performed by a user with a permission level of 1, so there is a vertical unauthorized vulnerability.
Reference article:
https://blog.csdn.net/elephantxiang/article/details/113480084
https://blog.csdn.net/qq_37077262/article/details/103025989
边栏推荐
- 【Unity3D】Tank对战
- 382. Linked List Random Node
- XSS online shooting range---haozi
- 七夕快乐!
- Adobe是什么?
- FVCOM 3D Numerical Simulation of Hydrodynamics, Water Exchange, Dispersion and Transport of Oil Spills丨FVCOM Model Watershed, Numerical Simulation Method of Marine Water Environment
- 基于支持向量机的网络⼊侵检测系统的全面调查和分类
- [b01lers2020]Life on Mars
- HCIP第十四天
- 【刷题篇】二叉树的右视图
猜你喜欢
Cisco ike2 IPSec configuration
基于支持向量机的网络⼊侵检测系统的全面调查和分类
封装、包、访问权限修饰符、static变量
IDaaS 是什么?一文说清它的价值
2022年全国职业院校技能大赛网络安全 B模块 任务十windows操作系统渗透测试 国赛原题
E-commerce data warehouse ODS layer-----log data loading
线程池的高级应用技巧核心解读
IO thread process -> thread synchronization mutual exclusion mechanism -> day6
for循环练习题
从0到1看支付
随机推荐
一些思考:腾讯股价为何持续都低
[b01lers2020]Life on Mars
基于支持向量机的网络⼊侵检测系统的全面调查和分类
483. Smallest Good Base
2022的七夕,奉上7个精美的表白代码,同时教大家快速改源码自用
目标检测的国内外研究现状
九种方式,教你读取 resources 目录下的文件路径
nxp官方uboot移植到野火开发板PRO(无任何代码逻辑的修改)
Soft exam system analysts note experience sharing: theory of protracted war
超级实用网站+公众号合集
2022年全国职业院校技能大赛网络安全 B模块 任务十windows操作系统渗透测试 国赛原题
【进阶自动化测试】一文1000教你如何用Postman做接口自动化测试
CAS:1797415-74-7_TAMRA-Azide-PEG-Biotin
LyScript 实现应用层钩子扫描器
Adobe是什么?
Conditional Statements for Shell Programming
E-commerce data warehouse ODS layer-----log data loading
投资性大于游戏性 NFT游戏到底是不是门好生意
21天打卡挑战学习MySQL—Day第一周 第一篇
授人以渔 - 如何自行查询任意 SAP UI5 控件属性的文档和技术实现细节试读版