Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

/supershell/log/xxxx.js 可以泄露用户名信息 #37

Open
tempaddtips opened this issue Sep 30, 2023 · 4 comments
Open

/supershell/log/xxxx.js 可以泄露用户名信息 #37

tempaddtips opened this issue Sep 30, 2023 · 4 comments

Comments

@tempaddtips
Copy link

`white_list = ['js', 'css', 'png', 'svg', 'jpg', 'jpeg']

@log_view.route('/supershell/log/path:name', methods=['GET'])
def log(name):
'''
访问日志
'''
return render_template('log.html',
supershell_version=supershell_version_dict['version'],
year=supershell_version_dict['info'][supershell_version_dict['version']]['mtime'].split('-')[0],
username=user,
name=name)`
此处可未授权访问 导致用户名泄露 导致溯源和爆破难度减小

@tempaddtips
Copy link
Author

另外希望大佬研究下 自动生成随机用户名和随机密码和jwt 类似于宝塔面板用户名那种

@tdragon6
Copy link
Owner

漏洞和建议反馈已收到,此漏洞之前也被@zjx师傅反馈过,后续会修复

@kenuoseclab
Copy link

另外希望大佬研究下 自动生成随机用户名和随机密码和jwt 类似于宝塔面板用户名那种

location ~* ^/supershell/log/.*.js$ {
deny all;
return 403;
}
直接nginx增加配置屏蔽即可

@kenuoseclab
Copy link

另外希望大佬研究下 自动生成随机用户名和随机密码和jwt 类似于宝塔面板用户名那种

那个太简单了,自己折腾折腾一下吧!没难度

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants