From b9e314d55ee684bff2e7a2ac843df6119207bb85 Mon Sep 17 00:00:00 2001
From: CLincat <3132002932@qq.com>
Date: Fri, 5 Aug 2022 14:39:16 +0800
Subject: [PATCH] 20220805-v1.1.2
---
README.md | 212 +++++++++++---------
README_en-us.md | 212 +++++++++++---------
lib/core/coreScan.py | 6 +
lib/initial/config.py | 7 +-
lib/initial/language.py | 4 +-
lib/initial/list.py | 144 +++++++-------
lib/initial/parse.py | 3 +-
lib/plugins/fingerprint/webapp.py | 94 ++++++++-
lib/report/output.py | 24 ++-
lib/tool/logger.py | 5 +-
payloads/ApacheHadoop.py | 155 +++++++++++++++
payloads/Gitea.py | 160 +++++++++++++++
payloads/Gitlab.py | 235 ++++++++++++++++++++++
payloads/Grafana.py | 148 ++++++++++++++
payloads/Landray.py | 134 +++++++++++++
payloads/RubyOnRails.py | 320 ++++++++++++++++++++++++++++++
payloads/Spring.py | 6 +-
payloads/Yonyou.py | 209 ++++++++++++++++++-
payloads/demo.py | 1 +
payloads/demo2.py | 2 +-
20 files changed, 1798 insertions(+), 283 deletions(-)
create mode 100644 payloads/ApacheHadoop.py
create mode 100644 payloads/Gitea.py
create mode 100644 payloads/Gitlab.py
create mode 100644 payloads/Grafana.py
create mode 100644 payloads/Landray.py
create mode 100644 payloads/RubyOnRails.py
diff --git a/README.md b/README.md
index 7ef23a1..eb805eb 100644
--- a/README.md
+++ b/README.md
@@ -6,108 +6,126 @@
* 如果有什么想法、建议或者遇到了BUG, 都可以issues
**目前支持扫描的web应用程序有:**
-> AlibabaDruid, AlibabaNacos, ApacheAirflow, ApacheAPISIX, ApacheFlink, ApacheSolr, ApacheStruts2, ApacheTomcat, AppWeb, AtlassianConfluence, Cicso, Discuz, Django, Drupal, ElasticSearch, F5-BIG-IP, Fastjson, Jenkins, Keycloak, mongo-express, Node.js, NodeRED, ShowDoc, Spring, ThinkPHP, Ueditor, Weblogic, Webmin, Yonyou
+> AlibabaDruid, AlibabaNacos, ApacheAirflow, ApacheAPISIX, ApacheFlink, ApacheHadoop, ApacheSolr, ApacheStruts2, ApacheTomcat, AppWeb, AtlassianConfluence, Cicso, Discuz, Django, Drupal, ElasticSearch, F5-BIG-IP, Fastjson, Gitea, Gitlab, Grafana, Landray-OA, RubyOnRails, Jenkins, Keycloak, mongo-express, Node.js, NodeRED, ShowDoc, Spring, ThinkPHP, Ueditor, Weblogic, Webmin, Yonyou
目前支持扫描的web漏洞有: [点击展开]
```
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Target | Vul_id | Type | Method | Description |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Alibaba Druid | None | unAuth | GET | 阿里巴巴Druid未授权访问 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Alibaba Nacos | CVE-2021-29441 | unAuth | GET/POST | 阿里巴巴Nacos未授权访问 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Apache Airflow | CVE-2020-17526 | unAuth | GET | Airflow身份验证绕过 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Apache APISIX | CVE-2020-13945 | unAuth | GET | Apache APISIX默认密钥 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Apache Flink | CVE-2020-17519 | FileRead | GET | Flink目录遍历 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Apache Solr | CVE-2021-27905 | SSRF | GET/POST | Solr SSRF/任意文件读取 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Apache Struts2 | S2-001 | RCE | POST | Struts2远程代码执行 |
-| Apache Struts2 | S2-005 | RCE | GET | Struts2远程代码执行 |
-| Apache Struts2 | S2-007 | RCE | GET | Struts2远程代码执行 |
-| Apache Struts2 | S2-008 | RCE | GET | Struts2远程代码执行 |
-| Apache Struts2 | S2-009 | RCE | GET | Struts2远程代码执行 |
-| Apache Struts2 | S2-012 | RCE | GET | Struts2远程代码执行 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Apache Tomcat | CVE-2017-12615 | FileUpload | PUT | PUT方法任意文件写入 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| AppWeb | CVE-2018-8715 | unAuth | GET | AppWeb身份认证绕过 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Atlassian Confluence | CVE-2015-8399 | FileRead | GET | Confluence任意文件包含 |
-| Atlassian Confluence | CVE-2019-3396 | RCE/FileRead | POST | Confluence路径遍历和命令执行 |
-| Atlassian Confluence | CVE-2021-26084 | RCE | POST | Confluence Webwork Pre-Auth OGNL表达式命令注入 |
-| Atlassian Confluence | CVE-2022-26134 | RCE | GET | Confluence远程代码执行 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Cisco | CVE-2020-3580 | XSS | POST | 思科ASA/FTD XSS跨站脚本攻击 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Discuz | wooyun-2010-080723 | RCE | GET | 全局变量防御绕过RCE |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Django | CVE-2017-12794 | XSS | GET | debug page XSS跨站脚本攻击 |
-| Django | CVE-2018-14574 | Redirect | GET | CommonMiddleware url重定向 |
-| Django | CVE-2019-14234 | SQLinject | GET | JSONfield SQL注入 |
-| Django | CVE-2020-9402 | SQLinject | GET | GIS SQL注入 |
-| Django | CVE-2021-35042 | SQLinject | GET | QuerySet.order_by SQL注入 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Drupal | CVE-2014-3704 | SQLinject | POST | Drupal < 7.32 Drupalgeddon SQL 注入 |
-| Drupal | CVE-2017-6920 | RCE | POST | Drupal Core 8 PECL YAML 反序列化代码执行 |
-| Drupal | CVE-2018-7600 | RCE | POST | Drupal Drupalgeddon 2 远程代码执行 |
-| Drupal | CVE-2018-7602 | RCE | POST | Drupal 远程代码执行 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| ElasticSearch | CVE-2014-3120 | RCE | POST | ElasticSearch命令执行 |
-| ElasticSearch | CVE-2015-1427 | RCE | POST | ElasticSearch Groovy 沙盒绕过&&代码执行 |
-| ElasticSearch | CVE-2015-3337 | FileRead | GET | ElasticSearch 目录穿越 |
-| ElasticSearch | CVE-2015-5531 | FileRead | PUT/GET | ElasticSearch 目录穿越 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| F5 BIG-IP | CVE-2020-5902 | RCE | GET | BIG-IP远程代码执行 |
-| F5 BIG-IP | CVE-2022-1388 | unAuth | POST | BIG-IP身份认证绕过 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Fastjson | CNVD-2017-02833 | unSerialize | POST | Fastjson <= 1.2.24 反序列化 |
-| Fastjson | CNVD-2019-22238 | unSerialize | POST | Fastjson <= 1.2.47 反序列化 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Jenkins | CVE-2018-1000861 | RCE | POST | jenkins 远程命令执行 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Keycloak | CVE-2020-10770 | SSRF | GET | 使用request_uri调用未经验证的URL |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| mongo-express | CVE-2019-10758 | RCE | POST | 未授权远程代码执行 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Nodejs | CVE-2017-14849 | FileRead | GET | Node.js目录穿越 |
-| Nodejs | CVE-2021-21315 | RCE | GET | Node.js命令执行 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| NodeRED | CVE-2021-3223 | FileRead | GET | Node-RED 任意文件读取 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| ShowDoc | CNVD-2020-26585 | FileUpload | POST | ShowDoc 任意文件上传 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Spring | CVE-2020-5410 | FileRead | GET | Spring Cloud目录遍历 |
-| Spring | CVE-2021-21234 | FileRead | GET | Spring Boot目录遍历 |
-| Spring | CVE-2022-22947 | RCE | POST | Spring Cloud Gateway SpEl远程代码执行 |
-| Spring | CVE-2022-22963 | RCE | POST | Spring Cloud Function SpEL远程代码执行 |
-| Spring | CVE-2022-22965 | RCE | GET/POST | Spring Framework远程代码执行 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| ThinkPHP | CVE-2018-1002015 | RCE | GET | ThinkPHP5.x 远程代码执行 |
-| ThinkPHP | CNVD-2018-24942 | RCE | GET | 未开启强制路由导致RCE |
-| ThinkPHP | CNNVD-201901-445 | RCE | POST | 核心类Request远程代码执行 |
-| ThinkPHP | None | RCE | GET | ThinkPHP2.x 远程代码执行 |
-| ThinkPHP | None | SQLinject | GET | ThinkPHP5 ids参数SQL注入 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Ueditor | None | SSRF | GET | Ueditor编辑器SSRF |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Oracle Weblogic | CVE-2014-4210 | SSRF | GET | Weblogic 服务端请求伪造 |
-| Oracle Weblogic | CVE-2017-10271 | unSerialize | POST | Weblogic XMLDecoder反序列化 |
-| Oracle Weblogic | CVE-2019-2725 | unSerialize | POST | Weblogic wls9_async反序列化 |
-| Oracle Weblogic | CVE-2020-14750 | unAuth | GET | Weblogic 权限验证绕过 |
-| Oracle Weblogic | CVE-2020-14882 | RCE | GET | Weblogic 未授权命令执行 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Webmin | CVE-2019-15107 | RCE | POST | Webmin Pre-Auth 远程代码执行 |
-| Webmin | CVE-2019-15642 | RCE | POST | Webmin 远程代码执行 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
-| Yonyou | CNVD-2021-30167 | RCE | GET | 用友NC BeanShell远程命令执行 |
-| Yonyou | None | FileRead | GET | 用友ERP-NC NCFindWeb目录遍历 |
-+----------------------+--------------------+--------------+----------+-------------------------------------------------------------------------+
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Target | Vul_id | Type | Description |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Alibaba Druid | None | unAuth | 阿里巴巴Druid未授权访问 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Alibaba Nacos | CVE-2021-29441 | unAuth | 阿里巴巴Nacos未授权访问 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Apache Airflow | CVE-2020-17526 | unAuth | Airflow身份验证绕过 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Apache APISIX | CVE-2020-13945 | unAuth | Apache APISIX默认密钥 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Apache Flink | CVE-2020-17519 | FileRead | Flink目录遍历 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Apache Hadoop | None | unAuth | Hadoop YARN ResourceManager 未授权访问 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Apache Solr | CVE-2021-27905 | SSRF | Solr SSRF/任意文件读取 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Apache Struts2 | S2-001 | RCE | Struts2远程代码执行 |
+| Apache Struts2 | S2-005 | RCE | Struts2远程代码执行 |
+| Apache Struts2 | S2-007 | RCE | Struts2远程代码执行 |
+| Apache Struts2 | S2-008 | RCE | Struts2远程代码执行 |
+| Apache Struts2 | S2-009 | RCE | Struts2远程代码执行 |
+| Apache Struts2 | S2-012 | RCE | Struts2远程代码执行 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Apache Tomcat | CVE-2017-12615 | FileUpload | PUT方法任意文件写入 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| AppWeb | CVE-2018-8715 | unAuth | AppWeb身份认证绕过 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Atlassian Confluence | CVE-2015-8399 | FileRead | Confluence任意文件包含 |
+| Atlassian Confluence | CVE-2019-3396 | RCE/FileRead | Confluence路径遍历和命令执行 |
+| Atlassian Confluence | CVE-2021-26084 | RCE | Confluence Webwork Pre-Auth OGNL表达式命令注入 |
+| Atlassian Confluence | CVE-2022-26134 | RCE | Confluence远程代码执行 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Cisco | CVE-2020-3580 | XSS | 思科ASA/FTD XSS跨站脚本攻击 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Discuz | wooyun-2010-080723 | RCE | 全局变量防御绕过RCE |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Django | CVE-2017-12794 | XSS | debug page XSS跨站脚本攻击 |
+| Django | CVE-2018-14574 | Redirect | CommonMiddleware url重定向 |
+| Django | CVE-2019-14234 | SQLinject | JSONfield SQL注入 |
+| Django | CVE-2020-9402 | SQLinject | GIS SQL注入 |
+| Django | CVE-2021-35042 | SQLinject | QuerySet.order_by SQL注入 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Drupal | CVE-2014-3704 | SQLinject | Drupal < 7.32 Drupalgeddon SQL 注入 |
+| Drupal | CVE-2017-6920 | RCE | Drupal Core 8 PECL YAML 反序列化代码执行 |
+| Drupal | CVE-2018-7600 | RCE | Drupal Drupalgeddon 2 远程代码执行 |
+| Drupal | CVE-2018-7602 | RCE | Drupal 远程代码执行 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| ElasticSearch | CVE-2014-3120 | RCE | ElasticSearch命令执行 |
+| ElasticSearch | CVE-2015-1427 | RCE | ElasticSearch Groovy 沙盒绕过&&代码执行 |
+| ElasticSearch | CVE-2015-3337 | FileRead | ElasticSearch 目录穿越 |
+| ElasticSearch | CVE-2015-5531 | FileRead | ElasticSearch 目录穿越 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| F5 BIG-IP | CVE-2020-5902 | RCE | BIG-IP远程代码执行 |
+| F5 BIG-IP | CVE-2022-1388 | unAuth | BIG-IP身份认证绕过 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Fastjson | CNVD-2017-02833 | unSerialize | Fastjson <= 1.2.24 反序列化 |
+| Fastjson | CNVD-2019-22238 | unSerialize | Fastjson <= 1.2.47 反序列化 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Gitea | None | unAuth | Gitea 1.4.0 未授权访问 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Gitlab | CVE-2021-22205 | RCE | GitLab Pre-Auth 远程命令执行 |
+| Gitlab | CVE-2021-22214 | SSRF | Gitlab CI Lint API未授权 SSRF |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Grafana | CVE-2021-43798 | FileRead | Grafana 8.x 插件模块路径遍历 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Jenkins | CVE-2018-1000861 | RCE | jenkins 远程命令执行 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Keycloak | CVE-2020-10770 | SSRF | 使用request_uri调用未经验证的URL |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Landray | CNVD-2021-28277 | FileRead/SSRF| 蓝凌OA 任意文件读取/SSRF |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| mongo-express | CVE-2019-10758 | RCE | 未授权远程代码执行 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Nodejs | CVE-2017-14849 | FileRead | Node.js目录穿越 |
+| Nodejs | CVE-2021-21315 | RCE | Node.js命令执行 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| NodeRED | CVE-2021-3223 | FileRead | Node-RED 任意文件读取 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Ruby on Rails | CVE-2018-3760 | FileRead | Ruby on Rails 路径遍历 |
+| Ruby on Rails | CVE-2019-5418 | FileRead | Ruby on Rails 任意文件读取 |
+| Ruby on Rails | CVE-2020-8163 | RCE | Ruby on Rails 命令执行 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| ShowDoc | CNVD-2020-26585 | FileUpload | ShowDoc 任意文件上传 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Spring | CVE-2020-5410 | FileRead | Spring Cloud目录遍历 |
+| Spring | CVE-2021-21234 | FileRead | Spring Boot目录遍历 |
+| Spring | CVE-2022-22947 | RCE | Spring Cloud Gateway SpEl远程代码执行 |
+| Spring | CVE-2022-22963 | RCE | Spring Cloud Function SpEL远程代码执行 |
+| Spring | CVE-2022-22965 | RCE | Spring Framework远程代码执行 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| ThinkPHP | CVE-2018-1002015 | RCE | ThinkPHP5.x 远程代码执行 |
+| ThinkPHP | CNVD-2018-24942 | RCE | 未开启强制路由导致RCE |
+| ThinkPHP | CNNVD-201901-445 | RCE | 核心类Request远程代码执行 |
+| ThinkPHP | None | RCE | ThinkPHP2.x 远程代码执行 |
+| ThinkPHP | None | SQLinject | ThinkPHP5 ids参数SQL注入 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Ueditor | None | SSRF | Ueditor编辑器SSRF |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Oracle Weblogic | CVE-2014-4210 | SSRF | Weblogic 服务端请求伪造 |
+| Oracle Weblogic | CVE-2017-10271 | unSerialize | Weblogic XMLDecoder反序列化 |
+| Oracle Weblogic | CVE-2019-2725 | unSerialize | Weblogic wls9_async反序列化 |
+| Oracle Weblogic | CVE-2020-14750 | unAuth | Weblogic 权限验证绕过 |
+| Oracle Weblogic | CVE-2020-14882 | RCE | Weblogic 未授权命令执行 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Webmin | CVE-2019-15107 | RCE | Webmin Pre-Auth 远程代码执行 |
+| Webmin | CVE-2019-15642 | RCE | Webmin 远程代码执行 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
+| Yonyou | CNNVD-201610-923 | SQLinject | 用友GRP-U8 Proxy SQL注入 |
+| Yonyou | CNVD-2021-30167 | RCE | 用友NC BeanShell远程命令执行 |
+| Yonyou | None | FileRead | 用友ERP-NC NCFindWeb目录遍历 |
+| Yonyou | None | DSinfo | 用友U8 OA getSessionList.jsp 敏感信息泄漏 |
+| Yonyou | None | SQLinject | 用友U8 OA test.jsp SQL注入 |
++----------------------+--------------------+--------------+--------------------------------------------------------------------+
```
The current web vulnerabilities that support scanning: [Click on]
```
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Target | Vul_id | Type | Method | Description |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Alibaba Druid | None | unAuth | GET | Alibaba Druid unAuthorized |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Alibaba Nacos | CVE-2021-29441 | unAuth | GET/POST | Alibaba Nacos unAuthorized |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Apache Airflow | CVE-2020-17526 | unAuth | GET | Airflow Authentication bypass |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Apache APISIX | CVE-2020-13945 | unAuth | GET | Apache APISIX default access token |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Apache Flink | CVE-2020-17519 | FileRead | GET | Flink Directory traversal |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Apache Solr | CVE-2021-27905 | SSRF | GET/POST | Solr SSRF/FileRead |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Apache Struts2 | S2-001 | RCE | POST | Struts2 Remote code execution |
-| Apache Struts2 | S2-005 | RCE | GET | Struts2 Remote code execution |
-| Apache Struts2 | S2-007 | RCE | GET | Struts2 Remote code execution |
-| Apache Struts2 | S2-008 | RCE | GET | Struts2 Remote code execution |
-| Apache Struts2 | S2-009 | RCE | GET | Struts2 Remote code execution |
-| Apache Struts2 | S2-012 | RCE | GET | Struts2 Remote code execution |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Apache Tomcat | CVE-2017-12615 | FileUpload | PUT | Put method writes to any file |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| AppWeb | CVE-2018-8715 | unAuth | GET | AppWeb Authentication bypass |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Atlassian Confluence | CVE-2015-8399 | FileRead | GET | Confluence any file include |
-| Atlassian Confluence | CVE-2019-3396 | RCE/FileRead | POST | Confluence Directory traversal && RCE |
-| Atlassian Confluence | CVE-2021-26084 | RCE | POST | Confluence OGNL expression command injection |
-| Atlassian Confluence | CVE-2022-26134 | RCE | GET | Confluence Remote code execution |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Cisco | CVE-2020-3580 | XSS | POST | Cisco ASA/FTD XSS |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Discuz | wooyun-2010-080723 | RCE | GET | Remote code execution |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Django | CVE-2017-12794 | XSS | GET | Django debug page XSS |
-| Django | CVE-2018-14574 | Redirect | GET | Django CommonMiddleware URL Redirect |
-| Django | CVE-2019-14234 | SQLinject | GET | Django JSONfield SQLinject |
-| Django | CVE-2020-9402 | SQLinject | GET | Django GIS SQLinject |
-| Django | CVE-2021-35042 | SQLinject | GET | Django QuerySet.order_by SQLinject |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Drupal | CVE-2014-3704 | SQLinject | POST | Drupal < 7.32 Drupalgeddon SQLinject |
-| Drupal | CVE-2017-6920 | RCE | POST | Drupal Core 8 PECL YAML Remote code execution |
-| Drupal | CVE-2018-7600 | RCE | POST | Drupal Drupalgeddon 2 Remote code execution |
-| Drupal | CVE-2018-7602 | RCE | POST | Drupal Remote code execution |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| ElasticSearch | CVE-2014-3120 | RCE | POST | ElasticSearch Remote code execution |
-| ElasticSearch | CVE-2015-1427 | RCE | POST | ElasticSearch Groovy Sandbox to bypass && RCE |
-| ElasticSearch | CVE-2015-3337 | FileRead | GET | ElasticSearch Directory traversal |
-| ElasticSearch | CVE-2015-5531 | FileRead | PUT/GET | ElasticSearch Directory traversal |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| F5 BIG-IP | CVE-2020-5902 | RCE | GET | BIG-IP Remote code execution |
-| F5 BIG-IP | CVE-2022-1388 | unAuth | POST | BIG-IP Authentication bypass |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Fastjson | CNVD-2017-02833 | unSerialize | POST | Fastjson <= 1.2.24 deSerialization |
-| Fastjson | CNVD-2019-22238 | unSerialize | POST | Fastjson <=1.2.47 deSerialization |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Jenkins | CVE-2018-1000861 | RCE | POST | jenkins Remote code execution |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Keycloak | CVE-2020-10770 | SSRF | GET | request_uri SSRF |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| mongo-express | CVE-2019-10758 | RCE | POST | Remote code execution |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Nodejs | CVE-2017-14849 | FileRead | GET | Node.js Directory traversal |
-| Nodejs | CVE-2021-21315 | RCE | GET | Node.js Remote code execution |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| NodeRED | CVE-2021-3223 | FileRead | GET | Node-RED Directory traversal |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| ShowDoc | CNVD-2020-26585 | FileUpload | POST | ShowDoc writes to any file |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Spring | CVE-2020-5410 | FileRead | GET | Spring Cloud Directory traversal |
-| Spring | CVE-2021-21234 | FileRead | GET | Spring Boot Directory traversal |
-| Spring | CVE-2022-22947 | RCE | POST | Spring Cloud Gateway SpEl Remote code execution |
-| Spring | CVE-2022-22963 | RCE | POST | Spring Cloud Function SpEL Remote code execution |
-| Spring | CVE-2022-22965 | RCE | GET/POST | Spring Framework Remote code execution |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| ThinkPHP | CVE-2018-1002015 | RCE | GET | ThinkPHP5.x Remote code execution |
-| ThinkPHP | CNVD-2018-24942 | RCE | GET | The forced route is not enabled Remote code execution |
-| ThinkPHP | CNNVD-201901-445 | RCE | POST | Core class Request Remote code execution |
-| ThinkPHP | None | RCE | GET | ThinkPHP2.x Remote code execution |
-| ThinkPHP | None | SQLinject | GET | ThinkPHP5 ids SQLinject |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Ueditor | None | SSRF | GET | Ueditor SSRF |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Oracle Weblogic | CVE-2014-4210 | SSRF | GET | Weblogic SSRF |
-| Oracle Weblogic | CVE-2017-10271 | unSerialize | POST | Weblogic XMLDecoder deSerialization |
-| Oracle Weblogic | CVE-2019-2725 | unSerialize | POST | Weblogic wls9_async deSerialization |
-| Oracle Weblogic | CVE-2020-14750 | unAuth | GET | Weblogic Authentication bypass |
-| Oracle Weblogic | CVE-2020-14882 | RCE | GET | Weblogic Unauthorized command execution |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Webmin | CVE-2019-15107 | RCE | POST | Webmin Pre-Auth Remote code execution |
-| Webmin | CVE-2019-15642 | RCE | POST | Webmin Remote code execution |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
-| Yonyou | CNVD-2021-30167 | RCE | GET | Yonyou-NC BeanShell Remote code execution |
-| Yonyou | None | FileRead | GET | Yonyou-ERP-NC NCFindWeb Directory traversal |
-+----------------------+--------------------+--------------+----------+------------------------------------------------------------+
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Target | Vul_id | Type | Description |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Alibaba Druid | None | unAuth | Alibaba Druid unAuthorized |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Alibaba Nacos | CVE-2021-29441 | unAuth | Alibaba Nacos unAuthorized |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Apache Airflow | CVE-2020-17526 | unAuth | Airflow Authentication bypass |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Apache APISIX | CVE-2020-13945 | unAuth | Apache APISIX default access token |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Apache Flink | CVE-2020-17519 | FileRead | Flink Directory traversal |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Apache Hadoop | None | unAuth | Hadoop YARN ResourceManager unAuthorized |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Apache Solr | CVE-2021-27905 | SSRF | Solr SSRF/FileRead |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Apache Struts2 | S2-001 | RCE | Struts2 Remote code execution |
+| Apache Struts2 | S2-005 | RCE | Struts2 Remote code execution |
+| Apache Struts2 | S2-007 | RCE | Struts2 Remote code execution |
+| Apache Struts2 | S2-008 | RCE | Struts2 Remote code execution |
+| Apache Struts2 | S2-009 | RCE | Struts2 Remote code execution |
+| Apache Struts2 | S2-012 | RCE | Struts2 Remote code execution |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Apache Tomcat | CVE-2017-12615 | FileUpload | Put method writes to any file |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| AppWeb | CVE-2018-8715 | unAuth | AppWeb Authentication bypass |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Atlassian Confluence | CVE-2015-8399 | FileRead | Confluence any file include |
+| Atlassian Confluence | CVE-2019-3396 | RCE/FileRead | Confluence Directory traversal && RCE |
+| Atlassian Confluence | CVE-2021-26084 | RCE | Confluence OGNL expression command injection |
+| Atlassian Confluence | CVE-2022-26134 | RCE | Confluence Remote code execution |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Cisco | CVE-2020-3580 | XSS | Cisco ASA/FTD XSS |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Discuz | wooyun-2010-080723 | RCE | Remote code execution |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Django | CVE-2017-12794 | XSS | Django debug page XSS |
+| Django | CVE-2018-14574 | Redirect | Django CommonMiddleware URL Redirect |
+| Django | CVE-2019-14234 | SQLinject | Django JSONfield SQLinject |
+| Django | CVE-2020-9402 | SQLinject | Django GIS SQLinject |
+| Django | CVE-2021-35042 | SQLinject | Django QuerySet.order_by SQLinject |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Drupal | CVE-2014-3704 | SQLinject | Drupal < 7.32 Drupalgeddon SQLinject |
+| Drupal | CVE-2017-6920 | RCE | Drupal Core 8 PECL YAML Remote code execution |
+| Drupal | CVE-2018-7600 | RCE | Drupal Drupalgeddon 2 Remote code execution |
+| Drupal | CVE-2018-7602 | RCE | Drupal Remote code execution |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| ElasticSearch | CVE-2014-3120 | RCE | ElasticSearch Remote code execution |
+| ElasticSearch | CVE-2015-1427 | RCE | ElasticSearch Groovy Sandbox to bypass && RCE |
+| ElasticSearch | CVE-2015-3337 | FileRead | ElasticSearch Directory traversal |
+| ElasticSearch | CVE-2015-5531 | FileRead | ElasticSearch Directory traversal |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| F5 BIG-IP | CVE-2020-5902 | RCE | BIG-IP Remote code execution |
+| F5 BIG-IP | CVE-2022-1388 | unAuth | BIG-IP Authentication bypass |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Fastjson | CNVD-2017-02833 | unSerialize | Fastjson <= 1.2.24 deSerialization |
+| Fastjson | CNVD-2019-22238 | unSerialize | Fastjson <=1.2.47 deSerialization |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Gitea | None | unAuth | Gitea 1.4.0 unAuthorized |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Gitlab | CVE-2021-22205 | RCE | GitLab Pre-Auth Remote code execution |
+| Gitlab | CVE-2021-22214 | SSRF | Gitlab CI Lint API SSRF |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Grafana | CVE-2021-43798 | FileRead | Grafana 8.x Directory traversal |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Jenkins | CVE-2018-1000861 | RCE | jenkins Remote code execution |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Keycloak | CVE-2020-10770 | SSRF | request_uri SSRF |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Landray | CNVD-2021-28277 | FileRead/SSRF| Landray-OA FileRead/SSRF |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| mongo-express | CVE-2019-10758 | RCE | Remote code execution |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Nodejs | CVE-2017-14849 | FileRead | Node.js Directory traversal |
+| Nodejs | CVE-2021-21315 | RCE | Node.js Remote code execution |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| NodeRED | CVE-2021-3223 | FileRead | Node-RED Directory traversal |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Ruby on Rails | CVE-2018-3760 | FileRead | Ruby on Rails Directory traversal |
+| Ruby on Rails | CVE-2019-5418 | FileRead | Ruby on Rails FileRead |
+| Ruby on Rails | CVE-2020-8163 | RCE | Ruby on Rails Remote code execution |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| ShowDoc | CNVD-2020-26585 | FileUpload | ShowDoc writes to any file |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Spring | CVE-2020-5410 | FileRead | Spring Cloud Directory traversal |
+| Spring | CVE-2021-21234 | FileRead | Spring Boot Directory traversal |
+| Spring | CVE-2022-22947 | RCE | Spring Cloud Gateway SpEl Remote code execution |
+| Spring | CVE-2022-22963 | RCE | Spring Cloud Function SpEL Remote code execution |
+| Spring | CVE-2022-22965 | RCE | Spring Framework Remote code execution |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| ThinkPHP | CVE-2018-1002015 | RCE | ThinkPHP5.x Remote code execution |
+| ThinkPHP | CNVD-2018-24942 | RCE | The forced route is not enabled Remote code execution |
+| ThinkPHP | CNNVD-201901-445 | RCE | Core class Request Remote code execution |
+| ThinkPHP | None | RCE | ThinkPHP2.x Remote code execution |
+| ThinkPHP | None | SQLinject | ThinkPHP5 ids SQLinject |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Ueditor | None | SSRF | Ueditor SSRF |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Oracle Weblogic | CVE-2014-4210 | SSRF | Weblogic SSRF |
+| Oracle Weblogic | CVE-2017-10271 | unSerialize | Weblogic XMLDecoder deSerialization |
+| Oracle Weblogic | CVE-2019-2725 | unSerialize | Weblogic wls9_async deSerialization |
+| Oracle Weblogic | CVE-2020-14750 | unAuth | Weblogic Authentication bypass |
+| Oracle Weblogic | CVE-2020-14882 | RCE | Weblogic Unauthorized command execution |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Webmin | CVE-2019-15107 | RCE | Webmin Pre-Auth Remote code execution |
+| Webmin | CVE-2019-15642 | RCE | Webmin Remote code execution |
++----------------------+--------------------+--------------+------------------------------------------------------------+
+| Yonyou | CNNVD-201610-923 | SQLinject | Yonyou-GRP-U8 Proxy SQLinject |
+| Yonyou | CNVD-2021-30167 | RCE | Yonyou-NC BeanShell Remote code execution |
+| Yonyou | None | FileRead | Yonyou-ERP-NC NCFindWeb Directory traversal |
+| Yonyou | None | DSinfo | Yonyou-U8-OA getSessionList.jsp Disclosure information |
+| Yonyou | None | SQLinject | Yonyou-U8-OA test.jsp SQLinject |
++----------------------+--------------------+--------------+------------------------------------------------------------+
```
.*一个廉价的树莓派的配置足以满足 Gitea 的最低系统硬件要求。最大程度上节省您的服务器资源!.*
', + r'所有的代码都开源在 GitHub 上,赶快加入我们来共同发展这个伟大的项目!还等什么?成为贡献者吧!' + ] + }, + { + 'name': 'gitlab', + 'path': '', + 'data': '', + 'fingerprint': [ + r'org\.apache\.hadoop\.yarn\.webapp\.WebAppException:' + ] + }, { 'name': 'jenkins', 'path': '', @@ -322,6 +380,15 @@ def __init__(self): # r'KindEditor - WYSIWYG HTML Editor for Internet' # ] # }, + { + 'name': 'landray', + 'path': '', + 'data': '', + 'fingerprint': [ + r'\["sys/ui/extend.{0,50}\.css"\]', + r"'lui': 'sys/ui/js'" + ] + }, { 'name': 'mongoexpress', 'path': '', @@ -353,6 +420,21 @@ def __init__(self): r'Node-RED ' ] }, + { + 'name': 'rails', + 'path': '', + 'data': '', + 'fingerprint': [ + r'Ruby on Rails ', + r'Yay! You’re on Rails!
', + r'Rails version:.*
', + r'Ruby version:.*(.*)', + r'', + r'
Rails\.root: .*