POC详情: 575c1638d9727e37121691a3c23a8c1342fea01c

来源
关联漏洞
标题: N/A (CVE-2023-49031)
描述:Tikit(现为Advanced)eMarketing平台6.8.3.0版本中存在目录遍历(本地文件包含)漏洞,远程攻击者可以通过构造特定载荷访问OpenLogFile端点的filename参数,读取任意文件并获取敏感信息。
描述
LFI Tikit eMarketing v6.8.3.0 (CVE-2023-49031)
介绍
# LFI Tikit eMarketing (CVE-2023-49031)
## Discovery
On November 2023, a novel local file inclusion vulnerability was identified in the “eMarketing” platform developed by Tikit (now Advanced) during a client engagement.
This issue was resolved with Advanced on February 2024

## Affected Versions 
This vulnerability has only been tested and vulnerable on version 6.8.3.0
![screenshot](/version.png)

## Attack Vector
The "filename" parameter used by "OpenLogFile" endpoint was found to be not sanitized. An unauthenticated threat actor may 
leverage this vulnerability to read arbitrary files from the local file system. 
![screenshot](/Attack_vector.png)
## POC
As a Proof-of-Concept (PoC), database credentials were collected from the "web.config" file found on a 
vulnerable machine. 
![screenshot](/POC.png)
## Vulnerability Check
An example HTTP GET payload (path + parameters) to read the hosts file on a vulnerable 
Windows system can be found below: 
* /DATA/Log/OpenLogFile?filename=C%3A%5CWindows%5CSystem32%5Cdrivers%
5Cetc%5Chosts
## Remediation
Update to the latest version of eMarketing 
文件快照

[4.0K] /data/pocs/575c1638d9727e37121691a3c23a8c1342fea01c ├── [ 82K] Attack_vector.png ├── [169K] POC.png ├── [1.1K] README.md └── [ 35K] version.png 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。