当前位置:网站首页>Logic Vulnerability----Permission Vulnerability
Logic Vulnerability----Permission Vulnerability
2022-07-30 13:23:00 【jjj34】
Ultra-authority loopholes are further divided into parallel ultra-authority, vertical ultra-authority and cross-authority.
Parallel override: the permission type remains unchanged, and the permission id changes
Vertical override: permission type changes, permission id remains unchanged
Cross-override: permission type changed, permission id changed

User 1 becomes user 2, and user 2 is also an ordinary user, and the level is overridden
User 1 changes from a common user to a system administrator, and vertically overrides the authority
User 1 becomes user 4, and user 4 has system administrator rights, cross-override
In Windows, the difference between admin and system:
The system user is used to manage the software, admin is the authority for the user
system manages software, admin manages users
1. Parallel overstepping
Horizontal override refers to an attacker attempting to access the resources of a user who has the same permissions as him.
For example, in a certain system, there is a function of personal data. Both account A and account B can access this function, but account A and account B have different permissions
When a accesses this function, it is intercepted by bp packet capture, and the user name is changed from a to b. At this time, user a may obtain the information of b, which is a horizontal unauthorized vulnerability.
All functions with horizontal authority division in the system have the risk of horizontal over-authorization. The following are the common scenarios of horizontal over-authorization:
1. Based on user ID
Such as an airline's order, he will access or operate the corresponding data through the identity id submitted by the user (user id, account number, mobile phone number, ID number and other unique user identifiers)

Among them, passengerID is the passenger, and contactID is the contact
After testing, it can be found that after these two parameters are modified, the ID cards and contact information of other passengers can be viewed

2. Based on object id
When using a function, access or operate the corresponding data through the object id submitted by the user (such as Dingding, record number)
For example: a system has a horizontal override vulnerability, grab the data package submitted by the order, and find that there is an oid that is very suspicious

Blast this oid to view the order information paid by others
3. Based on filename
When using a function, you can directly access the file through the file name, which is most common in the scenario where the user uploads the file
Hundreds of thousands of resources can be downloaded by traversing fileid

Vertical override
Vertical override refers to an attempt by a low-level attacker to access the resources of a high-level user.For example, a system is divided into ordinary users and administrators. The administrator has system management functions but ordinary users do not. Then we can understand that the management function has vertical authority division. If ordinary users can use some attack method to access themanagement function, then we call it vertical override.
Case 1: Vertical override by modifying js
A site's management background only uses js jump to restrict unauthorized user access

After removing js, you can successfully access the background and can operate

Case 2: First enter the background through ordinary users, and then achieve vertical override by modifying parameter values
A certain brand of light cats
Use the default username and password: useradmin/[email protected]#$%^ to log in to the system

Successful login background

Click "object management-user management-edit useradmin->get url */cgi/webif/Objset-users.sh?edituser=edituser&id=5"

Modify the parameter id=4 to vertically override the authority to telecomadmin's modification page

You can directly view the password by changing the password type of the password to the text type through the source code

Case 3: Permission control framework defect
The authority control framework is the basis for realizing the authority control function. If the authority control framework itself has defects and is easily compromised, the authority control function will be completely invalid.
Using a simple permission identifier in a cookie to mark the user's permission level or using a simple user ID in the user request parameter to control user permissions is typicalPermissions framework flaw.
For example, after a normal user logs in, uid=1 in the cookie; after an administrator user logs in, uid=2
Then we can log in as a normal user first, and then change the uid to 2
Summary
Be careful,
1. Modify js
2. Find the difference between ordinary users and administrator users, and then change the cookie of ordinary users to administrator users
边栏推荐
- 缓存一致性
- Eleven BUUCTF questions (06)
- What are the hard-core upgrades and applications that cannot be missed in Greenplum 6.0?
- 20220729 证券、金融
- Smart pointer implementation conjecture
- Analysis of AI recognition technology and application scenarios of TSINGSEE intelligent video analysis gateway
- libudev manual
- 外包干了七年,废了。。。
- RTSP/Onvif协议视频平台EasyNVR服务一键升级功能的使用教程
- dolphinscheduler simple task definition and complex cross-node parameter transfer
猜你喜欢

腾讯称电竞人才缺口200万;华为鸿蒙3.0正式发布;乐视推行每周工作4天半?...丨黑马头条...

for循环的3个表达式执行顺序

一本通循环结构的程序设计第一章题解(1)

Go 事,Gopher 要学的数字类型,变量,常量,运算符 ,第2篇

TaskDispatcher source code parsing

学习笔记——七周成为数据分析师《第一周:数据分析思维》

OpenHarmony环境搭建报错: ImportError: cannot import name ‘VERSION‘ from ‘hb.__main__‘

一本通循环结构的程序设计题解(2)

shell 编程规范与变量

C语言学习练习题:汉诺塔(函数与递归)
随机推荐
智能指针实现猜想
dolphinscheduler simple task definition and complex cross-node parameter transfer
Dolphinscheduler stand-alone transformation
OpenHarmony环境搭建报错: ImportError: cannot import name ‘VERSION‘ from ‘hb.__main__‘
datax开启hana支持以及dolphinscheduler开启datax任务
SyntaxError: EOL while scanning string literal
cpu / CS 和 IP
R语言ggplot2可视化时间序列数据(默认时间中断部分前后自动连接起来)、创建时间分组、使用分面图(faceting)可视化时间序列数据
jsArray array copy method performance test 2207292307
结合实战,浅析GB/T28181(三)——实况点播
PyQt5快速开发与实战 8.6 设置样式
R语言使用aov函数进行单因素协方差分析(One-way ANCOVA)、使用effects包中的effect函数来计算调整后的分组均值(calculate adjusted means)
【软考软件评测师】自动化测试章节下篇
for循环的3个表达式执行顺序
Dry Goods Sharing: Various Implementation Methods of Bean Management Factory with Great Use of Small Skills
el-table中el-table-column下的操作切换class样式
学习笔记——七周成为数据分析师《第二周:业务》:业务分析指标
打破原则引入SQL,MongoDB到底想要干啥???
Why is Prometheus a monitoring artifact sufficient to replace Zabbix?
手撕读写锁性能测试