Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-29441 PoC — Nacos 安全漏洞

Source
Associated Vulnerability
Title:Nacos 安全漏洞 (CVE-2021-29441)
Description:nacos是中国阿里巴巴(Alibaba)的一个动态服务发现、配置和服务管理平台。该软件支持基于 DNS 和基于 RPC 的服务发现,可提供提供实时健康检查,阻止服务向不健康的主机或服务实例发送请求等功能。 Nacos 存在安全漏洞,该漏洞源于允许Nacos服务器绕过过滤器,从而跳过身份验证检查。这种机制依赖于用户代理HTTP头,因此很容易被欺骗。
Description
This template only works on Nuclei engine prior to version 2.3.3 and version >= 2.3.5.

In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true)
Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that
enables Nacos servers to bypass this filter and therefore skip authentication checks.
This mechanism relies on the user-agent HTTP header so it can be easily spoofed.
This issue may allow any user to carry out any administrative tasks on the Nacos server.
File Snapshot

id: CVE-2021-29441 info: name: Nacos <1.4.1 - Authentication Bypass author: dwisiswant0 sever ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.