From 3ec426e74587b0c3cc3745f33d5e023e8cec2b42 Mon Sep 17 00:00:00 2001
From: wintrysec
Date: Mon, 14 Dec 2020 17:35:19 +0800
Subject: [PATCH] =?UTF-8?q?:zap:=E6=B7=BB=E5=8A=A0Shiro=E9=9D=B6=E6=9C=BA?=
=?UTF-8?q?=E5=92=8CS2-061=E9=9D=B6=E6=9C=BA=E4=BB=A5=E5=8F=8A=E4=BF=AE?=
=?UTF-8?q?=E6=94=B9=E8=AF=B4=E6=98=8E=E6=96=87=E6=A1=A3?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
---
README.md | 70 +++++++++++++++---
.../Apache-Shiro/Shiro-550/docker-compose.yml | 7 ++
Ranges/Cgi/CVE-2016-5385/docker-compose.yml | 16 ----
Ranges/Cgi/CVE-2016-5385/nginx/default.conf | 26 -------
Ranges/Cgi/CVE-2016-5385/www/index.php | 20 -----
.../CVE-2019-3396/docker-compose.yml | 14 ----
Ranges/Ecshop/ecshop-3.6.0/docker-compose.yml | 13 ----
Ranges/Struts2/s2-061/docker-compose.yml | 7 ++
Ranges/Supervisor/CVE-2017-11610/Dockerfile | 17 -----
.../CVE-2017-11610/docker-compose.yml | 7 --
.../CVE-2017-11610/docker-entrypoint.sh | 5 --
Ranges/imagemagick/CVE-2016–3714/Dockerfile | 5 --
.../CVE-2016–3714/docker-compose.yml | 9 ---
Ranges/imagemagick/CVE-2016–3714/www/demo.php | 2 -
.../imagemagick/CVE-2016–3714/www/upload.php | 23 ------
Ranges/imagemagick/CVE-2016–3714/www/vul.jpg | 4 -
flaskr/templates/index/welcome.html | 29 ++++----
instance/flaskr.sqlite | Bin 36864 -> 36864 bytes
18 files changed, 89 insertions(+), 185 deletions(-)
create mode 100644 Ranges/Apache/Apache-Shiro/Shiro-550/docker-compose.yml
delete mode 100644 Ranges/Cgi/CVE-2016-5385/docker-compose.yml
delete mode 100644 Ranges/Cgi/CVE-2016-5385/nginx/default.conf
delete mode 100644 Ranges/Cgi/CVE-2016-5385/www/index.php
delete mode 100644 Ranges/Confluence/CVE-2019-3396/docker-compose.yml
delete mode 100644 Ranges/Ecshop/ecshop-3.6.0/docker-compose.yml
create mode 100644 Ranges/Struts2/s2-061/docker-compose.yml
delete mode 100644 Ranges/Supervisor/CVE-2017-11610/Dockerfile
delete mode 100644 Ranges/Supervisor/CVE-2017-11610/docker-compose.yml
delete mode 100644 Ranges/Supervisor/CVE-2017-11610/docker-entrypoint.sh
delete mode 100644 Ranges/imagemagick/CVE-2016–3714/Dockerfile
delete mode 100644 Ranges/imagemagick/CVE-2016–3714/docker-compose.yml
delete mode 100644 Ranges/imagemagick/CVE-2016–3714/www/demo.php
delete mode 100644 Ranges/imagemagick/CVE-2016–3714/www/upload.php
delete mode 100644 Ranges/imagemagick/CVE-2016–3714/www/vul.jpg
diff --git a/README.md b/README.md
index 0bc2ec6..2d768a8 100644
--- a/README.md
+++ b/README.md
@@ -1,26 +1,81 @@
> **VulnRange的定位是一个漏洞靶场,用于快速的启动漏洞环境,便于漏洞复现和研究**
+使用VulnRange可以快速的部署含有未修复漏洞的Shiro和S2等第三方组件的测试环境,方便复现漏洞。
+
# 安装部署🚀
+## 注意事项
+
+> 1. 项目需要放到 `~/` 当前用户目录下
+> 2. ubuntu 需要将`start.sh`中的`~/`改为绝对路径,如`/home/ubuntu`
+> 3. 关闭Linux防火墙后请重启docker
+> 4. python使用python3.8以上版本
+> 5. 不建议部署在VPS上,小心被人GetShell
+
## 环境配置
**以Centos为例**
-1、[Centos安装python3.8和PIP](https://www.cnblogs.com/wintrysec/p/11963807.html)
+1、Centos安装python3.8和PIP
+
+```bash
+#安装python3.8
+yum -y install yum-utils
+yum-builddep python
+curl -O https://www.python.org/ftp/python/3.8.0/Python-3.8.0.tgz
+tar xf Python-3.8.0.tgz
+cd Python-3.8.0
+./configure
+make
+make install
+
+#设置python3.8为默认版本
+vi /etc/profile.d/python.sh #编辑用户自定义配置,输入alias参数
+alias python='/usr/local/bin/python3.8' #这里写你的python路径
+source /etc/profile.d/python.sh #重启会话使配置生效
+
+#安装pip
+wget https://bootstrap.pypa.io/get-pip.py
+python get-pip.py -i https://pypi.tuna.tsinghua.edu.cn/simple/
+```
2、安装docker和docker-compose [把docker源换掉,推荐阿里云的源]
+```bash
+#安装docker
+yum install -y yum-utils # yum-config-manager需要用这个包
+yum-config-manager --add-repo https://download.docker.com/linux/centos/docker-ce.repo #安装docker官方源
+yum makecache
+yum -y install docker-ce
+systemctl start docker
+
+#安装docker-compose
+pip install docker-compose -i https://pypi.mirrors.ustc.edu.cn/simple/
+```
+
+更换阿里源:[阿里云帮助手册](https://help.aliyun.com/document_detail/60750.html?spm=a2c4g.11186623.6.553.4851242foO76sC),用淘宝账号登陆后获取一个独有的加速地址
+
3、关闭防火墙和SELinux
+```bash
+firewall-cmd --state #查看防火墙状态
+systemctl stop firewall.service #停止防火墙
+systemctl disable firewall.service #禁止开机启动
+
+vim /etc/selinux/config/
+#修改为以下内容
+SELINUX=disabled
+
+#然后最好重启一下系统
+```
+
## 下载安装VulnRange
```bash
git clone https://github.com/wgpsec/VulnRange.git
cd VulnRange
pip install -e . -i https://pypi.tuna.tsinghua.edu.cn/simple/ #安装项目
-
-
-pip install Flask #自动安装完启动项目Flask报错后,更新pip 从新安装Flask即可
+pip install Flask #自动安装完启动项目Flask报错后,更新pip安装Flask
```
# 功能介绍:memo:
@@ -60,10 +115,3 @@ sh start.sh
靶机环境构建完成后,点击链接即可访问

-
-# 注意事项
-
-> 1. 项目需要放到 `~/` 当前用户目录下
-> 2. ubuntu 需要将`start.sh`中的`~/`改为绝对路径,如`/home/ubuntu`
-> 3. 关闭Linux防火墙后请重启docker
-
diff --git a/Ranges/Apache/Apache-Shiro/Shiro-550/docker-compose.yml b/Ranges/Apache/Apache-Shiro/Shiro-550/docker-compose.yml
new file mode 100644
index 0000000..d1881cc
--- /dev/null
+++ b/Ranges/Apache/Apache-Shiro/Shiro-550/docker-compose.yml
@@ -0,0 +1,7 @@
+version: '3'
+services:
+ web:
+ image: vulhub/shiro:1.2.4
+ container_name: Shiro-550
+ ports:
+ - "8080"
\ No newline at end of file
diff --git a/Ranges/Cgi/CVE-2016-5385/docker-compose.yml b/Ranges/Cgi/CVE-2016-5385/docker-compose.yml
deleted file mode 100644
index 27ad9cc..0000000
--- a/Ranges/Cgi/CVE-2016-5385/docker-compose.yml
+++ /dev/null
@@ -1,16 +0,0 @@
-version: '2'
-services:
- nginx:
- image: nginx:1
- container_name: CVE-2016-5385
- volumes:
- - ./www/index.php:/usr/share/nginx/html/index.php
- - ./nginx/default.conf:/etc/nginx/conf.d/default.conf
- depends_on:
- - php
- ports:
- - "80"
- php:
- image: vulhub/php:httpoxy
- volumes:
- - ./www/index.php:/var/www/html/index.php
\ No newline at end of file
diff --git a/Ranges/Cgi/CVE-2016-5385/nginx/default.conf b/Ranges/Cgi/CVE-2016-5385/nginx/default.conf
deleted file mode 100644
index 391fe79..0000000
--- a/Ranges/Cgi/CVE-2016-5385/nginx/default.conf
+++ /dev/null
@@ -1,26 +0,0 @@
-server {
- listen 80 default_server;
- listen [::]:80 default_server;
-
- root /usr/share/nginx/html;
-
- index index.html index.php;
-
- server_name _;
-
- location / {
- try_files $uri $uri/ =404;
- }
-
- location ~ [^/]\.php(/|$) {
- fastcgi_index index.php;
-
- include fastcgi_params;
-
- fastcgi_param REDIRECT_STATUS 200;
- fastcgi_param SCRIPT_FILENAME /var/www/html$fastcgi_script_name;
- fastcgi_param DOCUMENT_ROOT /var/www/html;
- fastcgi_pass php:9000;
- }
-
-}
\ No newline at end of file
diff --git a/Ranges/Cgi/CVE-2016-5385/www/index.php b/Ranges/Cgi/CVE-2016-5385/www/index.php
deleted file mode 100644
index 620e1ae..0000000
--- a/Ranges/Cgi/CVE-2016-5385/www/index.php
+++ /dev/null
@@ -1,20 +0,0 @@
- 'http://httpbin.org',
- // You can set any number of default request options.
- 'timeout' => 2.0,
-]);
-
-$response = $client->get('http://httpbin.org/get');
-
-$body = $response->getBody();
-
-echo $body;
\ No newline at end of file
diff --git a/Ranges/Confluence/CVE-2019-3396/docker-compose.yml b/Ranges/Confluence/CVE-2019-3396/docker-compose.yml
deleted file mode 100644
index f8f6026..0000000
--- a/Ranges/Confluence/CVE-2019-3396/docker-compose.yml
+++ /dev/null
@@ -1,14 +0,0 @@
-version: '2'
-services:
- web:
- image: vulhub/confluence:6.10.2
- container_name: CVE-2019-3369
- ports:
- - "8090:8090"
- depends_on:
- - db
- db:
- image: postgres:10.7-alpine
- environment:
- - POSTGRES_PASSWORD=postgres
- - POSTGRES_DB=confluence
\ No newline at end of file
diff --git a/Ranges/Ecshop/ecshop-3.6.0/docker-compose.yml b/Ranges/Ecshop/ecshop-3.6.0/docker-compose.yml
deleted file mode 100644
index 99e6689..0000000
--- a/Ranges/Ecshop/ecshop-3.6.0/docker-compose.yml
+++ /dev/null
@@ -1,13 +0,0 @@
-version: '2'
-services:
- ecshop36:
- image: vulhub/ecshop:3.6.0
- container_name: ecshop-3.6.0
- depends_on:
- - mysql
- ports:
- - "80"
- mysql:
- image: mysql:5.5
- environment:
- - MYSQL_ROOT_PASSWORD=root
\ No newline at end of file
diff --git a/Ranges/Struts2/s2-061/docker-compose.yml b/Ranges/Struts2/s2-061/docker-compose.yml
new file mode 100644
index 0000000..f41337e
--- /dev/null
+++ b/Ranges/Struts2/s2-061/docker-compose.yml
@@ -0,0 +1,7 @@
+version: '3'
+services:
+ struts2:
+ image: vulhub/struts2:2.5.25
+ container_name: s2-061
+ ports:
+ - "8080"
\ No newline at end of file
diff --git a/Ranges/Supervisor/CVE-2017-11610/Dockerfile b/Ranges/Supervisor/CVE-2017-11610/Dockerfile
deleted file mode 100644
index 492aee9..0000000
--- a/Ranges/Supervisor/CVE-2017-11610/Dockerfile
+++ /dev/null
@@ -1,17 +0,0 @@
-FROM vulhub/python:2.7
-
-MAINTAINER phithon
-
-COPY docker-entrypoint.sh /usr/local/bin/
-
-RUN pip install -U pip \
- && pip install "supervisor==3.3.2" \
- && echo_supervisord_conf | tee /usr/local/etc/supervisord.conf \
- && { \
- echo "[inet_http_server]"; \
- echo "port=0.0.0.0:9001"; \
- echo; \
- } | tee -a /usr/local/etc/supervisord.conf \
- && chmod +x /usr/local/bin/docker-entrypoint.sh
-
-CMD ["/usr/local/bin/docker-entrypoint.sh"]
\ No newline at end of file
diff --git a/Ranges/Supervisor/CVE-2017-11610/docker-compose.yml b/Ranges/Supervisor/CVE-2017-11610/docker-compose.yml
deleted file mode 100644
index b35ee8d..0000000
--- a/Ranges/Supervisor/CVE-2017-11610/docker-compose.yml
+++ /dev/null
@@ -1,7 +0,0 @@
-version: '3'
-services:
- web:
- build: .
- container_name: CVE-2017-11610
- ports:
- - "9001:9001"
\ No newline at end of file
diff --git a/Ranges/Supervisor/CVE-2017-11610/docker-entrypoint.sh b/Ranges/Supervisor/CVE-2017-11610/docker-entrypoint.sh
deleted file mode 100644
index a0d0492..0000000
--- a/Ranges/Supervisor/CVE-2017-11610/docker-entrypoint.sh
+++ /dev/null
@@ -1,5 +0,0 @@
-#!/bin/bash
-
-supervisord --user nobody -c /usr/local/etc/supervisord.conf
-
-while true; do sleep 30; done;
\ No newline at end of file
diff --git a/Ranges/imagemagick/CVE-2016–3714/Dockerfile b/Ranges/imagemagick/CVE-2016–3714/Dockerfile
deleted file mode 100644
index c556818..0000000
--- a/Ranges/imagemagick/CVE-2016–3714/Dockerfile
+++ /dev/null
@@ -1,5 +0,0 @@
-FROM vulhub/imagemagick:6.9.2
-
-MAINTAINER phithon
-
-RUN sed -i -e "s/Options -Indexes/Options +Indexes/g" $APACHE_CONFDIR/conf-available/docker-php.conf
\ No newline at end of file
diff --git a/Ranges/imagemagick/CVE-2016–3714/docker-compose.yml b/Ranges/imagemagick/CVE-2016–3714/docker-compose.yml
deleted file mode 100644
index abaed81..0000000
--- a/Ranges/imagemagick/CVE-2016–3714/docker-compose.yml
+++ /dev/null
@@ -1,9 +0,0 @@
-version: '3'
-services:
- apache:
- build: .
- container_name: CVE-2016–3714
- volumes:
- - ./www:/var/www/html
- ports:
- - "80"
\ No newline at end of file
diff --git a/Ranges/imagemagick/CVE-2016–3714/www/demo.php b/Ranges/imagemagick/CVE-2016–3714/www/demo.php
deleted file mode 100644
index 21409a6..0000000
--- a/Ranges/imagemagick/CVE-2016–3714/www/demo.php
+++ /dev/null
@@ -1,2 +0,0 @@
-getSize();
-
-echo "Image size is: ";
-print_r($size);
-
-else:
-?>
-
- /tmp/success`'
-pop graphic-context
\ No newline at end of file
diff --git a/flaskr/templates/index/welcome.html b/flaskr/templates/index/welcome.html
index 58abd23..d84481a 100644
--- a/flaskr/templates/index/welcome.html
+++ b/flaskr/templates/index/welcome.html
@@ -34,6 +34,15 @@
+
+
+ 狼组安全团队
+
+ 渗透测试导航
+
+
+
+
狼组安全团队
@@ -42,31 +51,25 @@
+
-
+
狼组安全团队
- Perception
+ UrlScan
+
-
- 黎焰攻防实验室
+
+ 狼组安全团队
Web后台批量爆破
-
-
- 黎焰攻防实验室
-
- 渗透测试导航
-
-
-
-
+
diff --git a/instance/flaskr.sqlite b/instance/flaskr.sqlite
index 9296cad1ccf05c272506e73bb4c443633028ff4a..3732b7b2263e5a0b2d269948e6e6b750aa801e87 100644
GIT binary patch
delta 894
zcmZXSUr19?9LLZ7w@u~V-+U0$Wlkfg^ltZFcg?NR%@O4&EtbhJO|gL*wCN^AjB;T#
zBhlNjKU5F)5J4C!7XnL(9`xA1Tvy+4KJ5h5qXL$
z2m30Ds3~MuqVg_1L!qq7=1{Aa2-}lqD+Hrf1PQY+zfl6tb>?BaQ^ZY9gWB%A#Tq$|
zDj>G-G)|sM@v9H+#8+?NYc}x)DvMa9Gdu7#LNUul5G1%)Fb>b47dpTLd$~W{H*T66
zwHeqJhp~bXeJwtD$!v)7k1FvMz0dBQQNy7rW1NhcJD7t8%VR#
zGlpqHzoAb5T7N-L>H2h;%mm|O$aJqEBklKCw1-w_dMuRBu!7i4wx>#uN_cw#D+!Xo
zixMx|%tDz%mK?IZdGmwtHj8MHQ!i$AyS(xKzWAH|cP?t`sC5S3WZKfb-lZFw
zzh3L-J(_#Y71RIjWe!_ONaBT3(YqEG9*x9D##hI(J@L3F@%H}WyW8pU$+0-@OZ3JT
zo(@YE!6IBYOBUH8$=+~hS2!fqpU~X%eL4I7t=(pKxCPnU+SVE1Wm%|qpF74&f>_Gi
fY$b;p__YPIwy^yW>8@aNORGN>Qz`1`ozu);VwM4Q
delta 1463
zcmZvcZ)_8F7{~8={U7h1&V|i(1a54LBE9zR+OF*-u$5*`aBL%;HZ?j^yV`Y|{a@XX
zgkgr+5GeCU;Dv^aC;?53E=Bx95q%*qe6<%dF&d(fwX4LyyS*~tuj~3}&R#F~yWi9M
zKF{ZQzSrpm+4O?!YzujRe!E+7pD-B*7e~@&oj_C6PBNYjCR5>PB-xApGPmqt=|uwm
zhP$u~KS2(zK?Wwl2mN4X)|dh^@GY8$^ga3)`e!lV4ej8Y$%lyV7PDjBCuki|ZDbvf5j{Rs2I_yd6sp5%Mr-|Bc(jzBEaL$3
z4Q%3Js8+IuqxpXx71c;$9HpAtMwW0CrKf5*a$BqB=;*T!60c{)^tWzP$3w8)D*$2&Pu
zUGQT?@s5CglQ>q!`u5UzcH)pnD)qdM!C?#??))LuS!6rzeRkBoj#n~(lTcvU9
zH`?cih6baPQ{^sU8=^ZY$#eKAEXMWLRb3L3@K?0?t1lX7H3=qL*{Q7C$gie94dxcSa&Y-RPhw{!|!2|hV?!n%d
z9i=vfHV<8tY*tBdROPHryWoi>!jTZ`4Zi-|MD%SueXGfeeu(Q2l>;O8lFmC@bVNzC
nR2z(S>>E0sU?80cr>58eS2{H+vK&_AO%7b>&g_>b2NnMUL_Dru