Bludit v3.16.2会话固定漏洞披露

本文详细披露了Bludit v3.16.2中的会话固定漏洞,包括漏洞复现步骤、HTTP请求与响应示例,以及影响版本和环境信息。

漏洞标题:会话固定 - bluditv3.16.2

日期:2025年7月

漏洞作者:Andrey Stoykov

版本:3.16.2

测试环境:Debian 12

博客:https://msecureltd.blogspot.com/

会话固定 #1:

复现步骤:

访问登录页面。使用有效用户登录并观察会话ID未被更改

// 登录的HTTP POST请求

POST /bludit/admin/ HTTP/1.1 Host: 192.168.58.133 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:140.0) Gecko/20100101 Firefox/140.0 […]

tokenCSRF=551bee4a6e6d065481ec1d29d9b37335475ae1d0&username=admin&password=password&save=

// HTTP响应

HTTP/1.1 301 Moved Permanently Date: Tue, 03 Jun 2025 20:34:36 GMT Server: Apache/2.4.37 (Unix) OpenSSL/1.0.2q PHP/5.6.40 mod_perl/2.0.8-dev Perl/v5.16.3 X-Powered-By: Bludit Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Location: /bludit/admin/dashboard Content-Length: 0 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8


通过Full Disclosure邮件列表发送 https://nmap.org/mailman/listinfo/fulldisclosure 网络存档和RSS:https://seclists.org/fulldisclosure/

comments powered by Disqus
使用 Hugo 构建
主题 StackJimmy 设计