Files
vulhub/ntopng/CVE-2021-28073/README.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

48 lines
1.3 KiB
Markdown

# ntopng Authentication Bypass (CVE-2021-28073)
[中文版本(Chinese version)](README.zh-cn.md)
Ntopng is a passive network monitoring tool focused on flows and statistics that can be obtained from the traffic captured by the server.
There is a authentication bypass vulnerability in ntopng 4.2 and previous versions.
Reference link:
- http://noahblog.360.cn/ntopng-multiple-vulnerabilities/
## Vulnerability Environment
Execute the following command to start ntopng:
```
docker compose up -d
```
After the server is started, browse the `http://your-ip:3000` to see the login page, whose default password is admin/admin, and the password will be request to reset for the first login.
## Vulnerability Reproduce
According to the reference link and the simple [poc.py](poc.py), calculate the length of the ntopng lua directory:
```
python poc.py --url http://your-ip:3000/ baselength
```
![](1.png)
It can be seen that the path length in the Vulhub container is 36.
Then, browse the page or interface that we want to access without authorization, such as `/lua/find_prefs.lua`, and it will be redirected to the login page.
Use POC to generate unauthorized access URL:
```
python poc.py --url http://your-ip:3000/ generate -l 36 -p find_prefs.lua
```
![](2.png)
The interface is able to access without authorization through this URL:
![](3.png)