Update GobyVuls-Document.md

This commit is contained in:
Goby 2023-07-24 18:38:44 +08:00 committed by GitHub
parent 5c3b690194
commit 2f71aff036
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -1,7 +1,20 @@
[# Goby History Update Vulnerability Total Document (Continuously Update) [# Goby History Update Vulnerability Total Document (Continuously Update)
The following content is an updated vulnerability from Goby. Some of the vulnerabilities are recorded on the screen for easy viewing. The following content is an updated vulnerability from Goby. Some of the vulnerabilities are recorded on the screen for easy viewing.
**Updated document date: Jul 21, 2023** **Updated document date: Jul 24, 2023**
## Adobe Coldfusion remote code execution vulnerability (CVE-2023-38203)
| **Vulnerability** | **Adobe Coldfusion remote code execution vulnerability (CVE-2023-38203)** |
| :----: | :-----|
| **Chinese name** | Adobe ColdFusion 远程代码执行漏洞CVE-2023-38203 |
| **CVSS core** | 9.8 |
| **FOFA Query** (click to view the results directly)| [(body="crossdomain.xml" && body="CFIDE") \|\| (body="#000808" && body="#e7e7e7")](https://en.fofa.info/result?qbase64=IChib2R5PSJjcm9zc2RvbWFpbi54bWwiICYmIGJvZHk9IkNGSURFIikgfHwgKGJvZHk9IiMwMDA4MDgiICYmIGJvZHk9IiNlN2U3ZTciKQ%3D%3D) |
| **Number of assets affected** | 3740 |
| **Description** | Adobe Coldfusion is a commercial application server developed by Adobe for web applications.The attacker can send unbelievable serialized data and trigger derivativeization to the Coldfusion server, thereby executing any code. |
| **Impact** | The attacker can execute the code at the server through this vulnerability, obtain the server permissions, and then control the entire web server. |
![](https://s3.bmp.ovh/imgs/2023/07/24/514d4dd7f7e3b52c.gif)
## SANGFOR-IOMS catjs.php File Read Vulnerability ## SANGFOR-IOMS catjs.php File Read Vulnerability