mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-06-20 09:50:49 +00:00
Update README.md
This commit is contained in:
parent
cf68dffedc
commit
3a3e799e62
@ -2,9 +2,9 @@
|
|||||||
|
|
||||||
The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request. Therefore, we can write a file and then move it to any directory, thereby causing arbitrary file writing vulnerability.
|
The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request. Therefore, we can write a file and then move it to any directory, thereby causing arbitrary file writing vulnerability.
|
||||||
|
|
||||||
Affected version: Apache ActiveMQ 5.x - 5.13.x
|
**Affected version**: Apache ActiveMQ 5.x - 5.13.x
|
||||||
|
|
||||||
FOFA query rule: app="Apache-ActiveMQ"
|
**[FOFA](https://fofa.so/result?qbase64=YXBwPSJBcGFjaGUtQWN0aXZlTVEi) query rule**: app="Apache-ActiveMQ"
|
||||||
|
|
||||||
# Demo
|
# Demo
|
||||||
|
|
||||||
|
@ -4,9 +4,9 @@ Drupal is an open source content management framework (CMF) written in PHP. It c
|
|||||||
|
|
||||||
Drupal had insufficient input sanitation on Form API (FAPI) AJAX requests. As a result, this enabled an attacker to potentially inject a malicious payload into the internal form structure. This would have caused Drupal to execute it without user authentication. By exploiting this vulnerability an attacker would have been able to carry out a full site takeover of any Drupal customer.
|
Drupal had insufficient input sanitation on Form API (FAPI) AJAX requests. As a result, this enabled an attacker to potentially inject a malicious payload into the internal form structure. This would have caused Drupal to execute it without user authentication. By exploiting this vulnerability an attacker would have been able to carry out a full site takeover of any Drupal customer.
|
||||||
|
|
||||||
Affected version: Drupal 6 - 8
|
**Affected version**: Drupal 6 - 8
|
||||||
|
|
||||||
FOFA query rule: app="Drupal"
|
**[FOFA](https://fofa.so/result?qbase64=YXBwPSJEcnVwYWwi) query rule**: app="Drupal"
|
||||||
|
|
||||||
# Demo
|
# Demo
|
||||||
|
|
||||||
|
@ -2,9 +2,9 @@
|
|||||||
|
|
||||||
A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.
|
A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.
|
||||||
|
|
||||||
Affected version: 2.153 and earlier, LTS 2.138.3 and earlier
|
**Affected version**: 2.153 and earlier, LTS 2.138.3 and earlier
|
||||||
|
|
||||||
FOFA query rule: app="Jenkins"
|
**[FOFA](https://fofa.so/result?qbase64=YXBwPSJKZW5raW5zIg%3D%3D) query rule**: app="Jenkins"
|
||||||
|
|
||||||
# Demo
|
# Demo
|
||||||
|
|
||||||
|
@ -2,9 +2,9 @@
|
|||||||
|
|
||||||
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
|
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
|
||||||
|
|
||||||
Affected Version: Apache Struts2 2.0.0 - 2.3.15
|
**Affected Version**: Apache Struts2 2.0.0 - 2.3.15
|
||||||
|
|
||||||
FOFA query rule: app="Struts2"
|
**[FOFA](https://fofa.so/result?qbase64=YXBwPSJTdHJ1dHMyIg%3D%3D) query rule**: app="Struts2"
|
||||||
|
|
||||||
# Demo
|
# Demo
|
||||||
|
|
||||||
|
@ -2,9 +2,9 @@
|
|||||||
|
|
||||||
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
|
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
|
||||||
|
|
||||||
Affected version: Apache Struts2 2.3.5 - 2.3.31 and 2.5.x - 2.5.10
|
**Affected version**: Apache Struts2 2.3.5 - 2.3.31 and 2.5.x - 2.5.10
|
||||||
|
|
||||||
FOFA query rule: app="Struts2"
|
**[FOFA](https://fofa.so/result?qbase64=YXBwPSJTdHJ1dHMyIg%3D%3D) query rule**: app="Struts2"
|
||||||
|
|
||||||
# Demo
|
# Demo
|
||||||
|
|
||||||
|
@ -10,9 +10,9 @@ $res = preg_replace('@(\w+)'.$depr.'([^'.$depr.'\/]+)@e', '$var[\'\\1\']="\\2";'
|
|||||||
|
|
||||||
这是个非常危险的参数,如果用了这个参数,`preg_replace` 的第二个参数就会被当做 PHP 代码执行。
|
这是个非常危险的参数,如果用了这个参数,`preg_replace` 的第二个参数就会被当做 PHP 代码执行。
|
||||||
|
|
||||||
影响版本:ThinkPHP 2.1
|
**影响版本**:ThinkPHP 2.1
|
||||||
|
|
||||||
FOFA 查询规则:app="ThinkPHP"
|
**[FOFA](https://fofa.so/result?qbase64=YXBwPSJUaGlua1BIUCI%3D) 查询规则**:app="ThinkPHP"
|
||||||
|
|
||||||
# Demo
|
# Demo
|
||||||
|
|
||||||
|
@ -4,9 +4,9 @@ ThinkPHP 诞生于 2006 年,是一个国产开源的 PHP 开发框架,其借
|
|||||||
|
|
||||||
在 ThinkPHP 5 中,由于框架对控制器名没有进行足够的检测,会导致在没有开启强制路由的情况下的远程代码执行漏洞。
|
在 ThinkPHP 5 中,由于框架对控制器名没有进行足够的检测,会导致在没有开启强制路由的情况下的远程代码执行漏洞。
|
||||||
|
|
||||||
影响版本:ThinkPHP 5.x
|
**影响版本**:ThinkPHP 5.x
|
||||||
|
|
||||||
FOFA 查询规则:app="ThinkPHP"
|
**[FOFA](https://fofa.so/result?qbase64=YXBwPSJUaGlua1BIUCI%3D) 查询规则**:app="ThinkPHP"
|
||||||
|
|
||||||
# Demo
|
# Demo
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user