VoIPmonitor GUI¿çÕ¾½Å±¾Â©¶´
Ðû²¼Ê±¼ä 2021-06-170x00 ©¶´¸ÅÊö
CVE ID | ʱ ¼ä | 2021-06-17 | |
Àà ÐÍ | XSS | µÈ ¼¶ | ¸ßΣ |
Ô¶³ÌÀûÓà | ÊÇ | Ó°Ï췶Χ | |
¹¥»÷ÅÓ´ó¶È | ¿ÉÓÃÐÔ | ||
Óû§½»»¥ | ËùÐèȨÏÞ | ÎÞ | |
PoC/EXP | δ¹ûÈ» | ÔÚÒ°ÀûÓà | ·ñ |
0x01 ©¶´ÏêÇé
SIP (Session Initiation Protocol£¬¼´»á»°ÌᳫÐÒé)ÊÇÒ»¸öÓ¦ÓòãµÄÐÅÁî¿ØÖÆÐÒ飬ÓÃÓÚ´´½¨¡¢Ð޸ĺÍÊÍ·ÅÒ»¸ö»ò¶à¸ö¼ÓÈëÕߵĻỰ¡£SIPÊÇ¿ÉÓÃÓÚʵÏÖVoIPµÄÖÚ¶àÐÒéÖ®Ò»£¬Êǹ㷺ʹÓõÄÐÐÒµ³ß¶ÈÐÒé¡£
VoIPmonitorÊÇ¿ªÔ´µÄÍøÂçÊý¾Ý°üÐá̽Æ÷Èí¼þ£¬¿É×¥°ü·ÖÎöSIPºÍRTPµÈÐÒé¡£
2021Äê06ÔÂ10ÈÕ£¬Enable Security µÄÄþ¾²Ñо¿Ô± Juxhin Dyrmishi Brigjaj ¹ûÈ»Åû¶ÁËVoIPmonitor GUIÖеÄÒ»¸ö¿çÕ¾µã½Å±¾ (XSS) ©¶´¡£Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔͨ¹ý·¢ËͶñÒâ SIP ÏûÏ¢ÔÚÄ¿±êϵͳÉÏÖ´ÐжñÒâ´úÂ룬ÉõÖÁ»ñµÃ¶ÔÄ¿±êϵͳµÄ³Ö¾ÃºóÃÅ·ÃÎÊ¡£
Ñо¿ÈËԱͨ¹ý½«User-AgentÉèÖÃΪ<img src=x alert(1)>£¬Èç¹ûËüÔÚ DOM ÖзºÆð£¬ä¯ÀÀÆ÷½«ÎÞ·¨»ñÈ¡ÏÂ/xµÄͼÏñ£¬²¢ÔÚʧ°ÜʱִÐжñÒâ´úÂ룺
Ñо¿ÈËÔ±ÀûÓôË©¶´´´½¨ÁËÒ»¸öºóÃŹÜÀíÓû§£¬½«ÁÙʱȨÏÞÌáÉýΪÓÀ¾Ã¹ÜÀíÔ±·ÃÎÊȨÏÞ£º
´ËÍ⣬¹¥»÷Õß»¹¿ÉÄÜÌᳫÒÔϹ¥»÷»î¶¯£º
l Éø³öͨ¹ýºÏ·¨ VoIP ¿Í»§¶ËµÄÃô¸ÐÊý¾Ý¡£ÕâÔÚÏÖʵ»·¾³ÖÐÌØ±ðÓÐÓã¬VoIPmonitor GUI½«ÔÚÄÚ²¿ÔËÐУ¬¿ÉÒÔͨ¹ý´øÍâDNS·þÎñÆ÷£¨»òÆäËüÒªÁ죩ÇÔÈ¡Êý¾Ý£»
l Óë´´½¨¹ÜÀíÔ±Óû§µÄ·½Ê½ÀàËÆ£¬Ò²¿ÉÒÔɾ³ý·ÃÎʽçÃæµÄÆäËûºÏ·¨¹ÜÀíÔ±£»
l ¿ÉÒÔÔڵǼÆÁÄ»ÉÏǶÈë¼üÅ̼ǼÆ÷×÷ΪºóÃÅ£¬ÊÕ¼¯¹ÜÀíԱƾ¾Ý£»
l ÀûÓÃÄÚ²¿ Web Ó¦Ó÷¨Ê½¡£
Ó°Ï췶Χ
VoIPmonitor GUI
0x02 ´¦Öý¨Òé
VoIPmonitor GUIÒѾÐû²¼ÁË´Ë©¶´µÄÄþ¾²²¹¶¡£¬½¨Ò龡¿ìÉý¼¶µ½×îа汾¡£
ÏÂÔØÁ´½Ó£º
http://www.voipmonitor.org/download?WHMCSwxPBfGDQsX5v=t8vcrgugv6jq8uukuk0gf3untr
ͨÓÃÄþ¾²½¨Òé
¶ÔÊäÈë»òÊä³ö½øÐбàÂ룻
½¨ÒéÔÚÓ¦Ó÷¨Ê½ÖÐʹÓõ¥Ò»±àÂë¼ÆÄ±£¬ÖÆÖ¹Ë«ÖرàÂë»òË«ÖØ½âÂëÆÆ»µ½çÃæ»òµ¼ÖÂXSS¹¥»÷£»
Èç¹ûÓû§ÊäÈë¾ßÓÐÔ¤ÆÚµÄ¸ñʽ¡¢½á¹¹ºÍ¿É½ÓÊܵÄÖµ£¬ÇëÊ×ÏÈÑéÖ¤ÕâЩ²¢¹ýÂËÎÞЧÊäÈë¡£
Õë¶ÔDOM-XSSµÈ¿Í»§¶ËÊäÈë½øÐÐתÒåºÍ±àÂë¡£
0x03 ²Î¿¼Á´½Ó
https://www.rtcsec.com/post/2021/06/abusing-sip-for-cross-site-scripting-most-definitely/
http://www.voipmonitor.org/changelog-gui?major=5&WHMCSwxPBfGDQsX5v=t8vcrgugv6jq8uukuk0gf3untr
https://latesthackingnews.com/2021/06/16/xss-vulnerability-in-sip-protocol-risks-rce-attacks-on-voip-software/
0x04 ʱ¼äÏß
2021-06-10 Ñо¿ÈËÔ±¹ûÈ»Åû¶©¶´
2021-06-17 VSRCÐû²¼Äþ¾²Í¨¸æ
0x05 ¸½Â¼
CVSSÆÀ·Ö³ß¶È¹ÙÍø£ºhttp://www.first.org/cvss/