A school infrastructure system vulnerability discovery


Some of the words

All cases are authorized legal compliance projects. Do not carry out any penetration attacks without authorization. Please abide by the network security law 

Long time in the past, an authorization, in the process of the red team hit a school infrastructure systems, to improve access to sensitive information to gain more scores, thus progress conveniently find some loopholes, web vulnerability is very regular, mainly based on some logical loopholes to make a case to share, sure, of course, this is not all logical loopholes can add cent

Buy electricity at a low price

Through the student account obtained, I successfully logged in to the infrastructure system and found that I could buy electricity bills. I tried to find logical loopholes

After a few minutes of basic testing, it was confirmed that the place where the order was placed did not verify the order data, but directly received the data submitted by users, so as to realize the purchase of more water and electricity at a low price

By default, 1 yuan buys 1.64 degrees,like this

After confirming the recharge, catch the data packet

I was just trying to guess, to see if I could find any holes in the logic, because the system was already working through the Web getshell, So change the count parameter to the amount you want to top up, which is also very small to avoid detection

After releasing the modified data package and making automatic payment through the subsequent campus card, you will get the payment voucher and confirm that you can purchase 16.4 amount of electricity with 1 yuan

CSRF added by administrator

After trying, I found that the administrator's account password is also a weak password. When I added the administrator's account, I found that there is also a CSRF vulnerability that can be successfully played 
 
Add administrator functions as follows 

Just fill in the form 

Get data packet

It can be seen here that there is no token, no referer field, and all are transmitted in clear text. The user's account password is controllable and changeable 

Don't forget to delete this account when testing again later, or you can change the account name 

Very simple, you can use burp to produce CSRF payload directly 

The successful confirmation after browser access is as follows 

Confirm that the administrator account is successfully created in the background 

Unauthorized access to all campus employee information

Through a fuzzy query function point in the system, you only need to enter the last name to obtain the staff information of the school. Basically, through this function point, you can obtain the organizational structure of the target, which provides great help for the directional penetration of progress 

Get data packet, after some testing, it must be passed by post. The get method cannot succeed, but it does not affect the final effect. Just traverse the last name directly 

There are a lot of sensitive information, such as name, Department, Email, ID card and mobile phone number. It is basically clear that the target personnel can be located. Here is only a case for explanation 

If the Intranet in the shell of this system doesn't move horizontally, I think you must know how to use this information to improve targeted social worker fishing 

Later words

In my opinion, in the red team operation, it is important to obtain system permissions, but it is also very important to try to improve and obtain more sensitive information through such infrastructure systems. After all, there must be a lot of people using infrastructure systems. If you can find some logical vulnerabilities involving personal sensitive information, it will provide effective support for progress directed attacks 

Author: Yangsir
Reprint policy: All articles in this blog are used except for special statements CC BY 4.0 reprint policy. If reproduced, please indicate source Yangsir !
  TOC