Merge pull request #12 from corp0ra1/master

add cve
This commit is contained in:
tardc 2021-08-02 14:58:39 +08:00 committed by GitHub
commit 8229a84e96
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
6 changed files with 33 additions and 0 deletions

Binary file not shown.

After

Width:  |  Height:  |  Size: 970 KiB

View File

@ -0,0 +1,11 @@
# Klog Server Unauth RCE(CVE-2020-35729)
The 'authenticate.php' file uses the 'user' HTTP POST parameter in a call to the 'shell_exec()' PHP function without appropriate input validation,allowing arbitrary command execution as the apache user.
**Affected Version**: ≤2.4.1
**FOFA query rule**: [title="KLog Server" && body="authenticate.php"](https://fofa.so/result?qbase64=dGl0bGU9IktMb2cgU2VydmVyIiYmYm9keT0iYXV0aGVudGljYXRlLnBocCI%3D)
# Demo
![](CVE_2020_35729.gif)

Binary file not shown.

After

Width:  |  Height:  |  Size: 713 KiB

View File

@ -0,0 +1,11 @@
# Mida eFramework ajaxreq.php RCE(CVE-2020-15920)
There is an OS Command Injection in Mida eFramework through 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. No authentication is required.
**Affected Version**: ≤2.9.0
**FOFA query rule**: [body="eFramework.css" && body="MUP"](https://fofa.so/result?qbase64=Ym9keT0iZUZyYW1ld29yay5jc3MiICYmIGJvZHk9Ik1VUCI%3D)
# Demo
![](CVE_2020_15920.gif)

Binary file not shown.

After

Width:  |  Height:  |  Size: 897 KiB

View File

@ -0,0 +1,11 @@
# Nette Framework RCE(CVE-2020-15227)
Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework.
**Affected Version**: before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6
**FOFA query rule**: [app="NetteFramework"](https://fofa.so/result?qbase64=YXBwPSJOZXR0ZUZyYW1ld29yayI%3D)
# Demo
![](CVE_2020_15227.gif)