ADD drupal_6340

This commit is contained in:
mahui 2020-12-13 22:50:58 +08:00
parent 0c9b6a34ed
commit e4fcb65e0b
5 changed files with 5 additions and 16 deletions

Binary file not shown.

After

Width:  |  Height:  |  Size: 250 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 220 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 333 KiB

View File

@ -1,11 +1,11 @@
# CVE-2020-24571 NexusDB path traversal
# CVE-2020-5847 Unraid 6.8.0 authenticate bypass remote code execution
NexusQA NexusDB before 4.50.23 allows the reading of files via ../ directory traversal.
Unraid是一套主要用于个人和小型企业的操作系统。Unraid 6.8.0及之前版本中存在安全漏洞。攻击者可利用该漏洞绕过访问控制并执行代码,从而获取服务器权限。
**Affected version**: nexusdb < 4.50.23
**Affected version**: Unraid <= 6.8.0
**[FOFA](https://fofa.so/result?q=header%3D%22Server%3A+NexusDB%22&qbase64=aGVhZGVyPSJTZXJ2ZXI6IE5leHVzREIi&file=&file=) query rule**: header="Server: NexusDB"
**[FOFA](https://fofa.so/result?qbase64=Ym9keT0iL3dlYkd1aS9pbWFnZXMvZ3JlZW4tb24ucG5nIg) query rule**: body="/webGui/images/green-on.png"
# Demo
![](CVE-2020-24571.gif)
![](CVE-2020-5847.gif)

View File

@ -1,11 +0,0 @@
# CVE-2020-24571 NexusDB path traversal
NexusQA NexusDB before 4.50.23 allows the reading of files via ../ directory traversal.
**Affected version**: nexusdb < 4.50.23
**[FOFA](https://fofa.so/result?q=header%3D%22Server%3A+NexusDB%22&qbase64=aGVhZGVyPSJTZXJ2ZXI6IE5leHVzREIi&file=&file=) query rule**: header="Server: NexusDB"
# Demo
![](CVE-2020-24571.gif)