当前位置:网站首页>Logic Vulnerability----Permission Vulnerability
Logic Vulnerability----Permission Vulnerability
2022-07-30 13:23:00 【jjj34】
Ultra-authority loopholes are further divided into parallel ultra-authority, vertical ultra-authority and cross-authority.
Parallel override: the permission type remains unchanged, and the permission id changes
Vertical override: permission type changes, permission id remains unchanged
Cross-override: permission type changed, permission id changed

User 1 becomes user 2, and user 2 is also an ordinary user, and the level is overridden
User 1 changes from a common user to a system administrator, and vertically overrides the authority
User 1 becomes user 4, and user 4 has system administrator rights, cross-override
In Windows, the difference between admin and system:
The system user is used to manage the software, admin is the authority for the user
system manages software, admin manages users
1. Parallel overstepping
Horizontal override refers to an attacker attempting to access the resources of a user who has the same permissions as him.
For example, in a certain system, there is a function of personal data. Both account A and account B can access this function, but account A and account B have different permissions
When a accesses this function, it is intercepted by bp packet capture, and the user name is changed from a to b. At this time, user a may obtain the information of b, which is a horizontal unauthorized vulnerability.
All functions with horizontal authority division in the system have the risk of horizontal over-authorization. The following are the common scenarios of horizontal over-authorization:
1. Based on user ID
Such as an airline's order, he will access or operate the corresponding data through the identity id submitted by the user (user id, account number, mobile phone number, ID number and other unique user identifiers)

Among them, passengerID is the passenger, and contactID is the contact
After testing, it can be found that after these two parameters are modified, the ID cards and contact information of other passengers can be viewed

2. Based on object id
When using a function, access or operate the corresponding data through the object id submitted by the user (such as Dingding, record number)
For example: a system has a horizontal override vulnerability, grab the data package submitted by the order, and find that there is an oid that is very suspicious

Blast this oid to view the order information paid by others
3. Based on filename
When using a function, you can directly access the file through the file name, which is most common in the scenario where the user uploads the file
Hundreds of thousands of resources can be downloaded by traversing fileid

Vertical override
Vertical override refers to an attempt by a low-level attacker to access the resources of a high-level user.For example, a system is divided into ordinary users and administrators. The administrator has system management functions but ordinary users do not. Then we can understand that the management function has vertical authority division. If ordinary users can use some attack method to access themanagement function, then we call it vertical override.
Case 1: Vertical override by modifying js
A site's management background only uses js jump to restrict unauthorized user access

After removing js, you can successfully access the background and can operate

Case 2: First enter the background through ordinary users, and then achieve vertical override by modifying parameter values
A certain brand of light cats
Use the default username and password: useradmin/[email protected]#$%^ to log in to the system

Successful login background

Click "object management-user management-edit useradmin->get url */cgi/webif/Objset-users.sh?edituser=edituser&id=5"

Modify the parameter id=4 to vertically override the authority to telecomadmin's modification page

You can directly view the password by changing the password type of the password to the text type through the source code

Case 3: Permission control framework defect
The authority control framework is the basis for realizing the authority control function. If the authority control framework itself has defects and is easily compromised, the authority control function will be completely invalid.
Using a simple permission identifier in a cookie to mark the user's permission level or using a simple user ID in the user request parameter to control user permissions is typicalPermissions framework flaw.
For example, after a normal user logs in, uid=1 in the cookie; after an administrator user logs in, uid=2
Then we can log in as a normal user first, and then change the uid to 2
Summary
Be careful,
1. Modify js
2. Find the difference between ordinary users and administrator users, and then change the cookie of ordinary users to administrator users
边栏推荐
- 初级永磁直线电机双动子电流镜像容错控制
- js背景切换时钟js特效代码
- Raja Koduri澄清Arc GPU跳票传闻 AXG年底前新推四条产品线
- [PostgreSQL] - Storage structure and cache shared_buffers
- 每天学一点Scala之 伴生类和伴生对象
- 如何把Excel表格显示到邮件正文里?
- 一本通循环结构的程序设计第一章题解(1)
- dolphinscheduler添加hana支持
- R语言ggplot2可视化:使用ggpubr包的ggboxplot函数可视化分组箱图、使用ggpar函数改变图形化参数(ylim、修改可视化图像y轴坐标轴数值范围)
- curl 执行脚本时传递环境变量与参数
猜你喜欢

程序员修炼之道:务以己任,实则明心——通向务实的最高境界

缓存一致性

How to display an Excel table in the body of an email?

一本通循环结构的程序设计题解(2)

shell script flow control statement

力扣——11.盛最多水的容器

shell 编程规范与变量

leetcode207.课程表(判断有向图是否有环)

Yilian: Activating the Value Potential of Data Elements and Unleashing the Innovation Dividend of SAS SSD

Raja Koduri澄清Arc GPU跳票传闻 AXG年底前新推四条产品线
随机推荐
qq udp tcp机制
如何把Excel表格显示到邮件正文里?
第42讲:Scala中泛型类、泛型函数、泛型在Spark中的广泛应用
How to migrate the device data connected by RTSP of EasyCVR platform to EasyNVR?
dolphinscheduler简单任务定义及复杂的跨节点传参
TaskDispatcher source code parsing
jsArray array copy method performance test 2207300040
for循环的3个表达式执行顺序
机器学习——特征选择
Scala基础:数组(Array)、映射(Map)、元组(Tuple)、集合(List)
Decoding Redis' most overlooked high CPU and memory usage issues
canvas彩虹桥动画js特效
手撕读写锁性能测试
DeFi 巨头进军 NFT 领域 用户怎么看?
Go 事,Gopher 要学的数字类型,变量,常量,运算符 ,第2篇
第十五天笔记
OpenHarmony环境搭建报错: ImportError: cannot import name ‘VERSION‘ from ‘hb.__main__‘
odoo--qweb模板介绍(一)
正确处理页面控制器woopagecontroller.php,当提交表单时是否跳转正确的页面
[PostgreSQL] - 存储结构及缓存shared_buffers