getshell漏洞总结
1.shiro系列
漏洞指纹:
set-Cookie:rememberMe=deleteMe
2.struts2
漏洞指纹:
Struts
.action
.do
.action!xxxx
3.fastjson
漏洞指纹:
{"@type":"java.net.Inet4Address", "val": "dnslog"}
{"@type":"java.net.Inet6Address", "val": "dnslog")
{"@type": "java.net.InetSocketAddress'{"address":, "val":"dnslog {"@type":"com.alibaba.fastjson.JSONObject", {@type": "java.ne ff"
{{@type": "java.net.URL", "val": "dnslog"}: "aaa"}
Set[{"@type": "java.net.URL", "val": "dnslog"}]
Set[{"@type":"java.net.URL", "val": "dnslog"}]
{{"@type":"java.net.URL", "val": "dnslog"}:0
4.Xstream反序列化
漏洞指纹:
xml
xml不仅可以xxe,还能反序列化代码执行
5.泛微OA Bsh远程代码执行
漏洞指纹:
Set-Cookie: ecology_JSessionld= ecology
WorkflowCenterTreeData
/mobile/plugin/SyncUserlnfo.jsp
6.通达OA远程代码执行
漏洞指纹
"/images/tongda.ico">
Office Anywhere 20xx版网络智能办公系统
/ispirit/interface/gateway.php
7.通达OA SQL注入
漏洞指纹:
"/images/tongda.ico">
Office Anywhere 20xx版网络智能办公系统 /ispirit/interface/gateway.php
8.志远OA A8 htmlofficeservlet getshell 漏洞
漏洞指纹:
/seeyon/htmlofficeservlet
/seeyon/index.jsp
seeyon
9.志远OA 帆软报表 seeyonreport 远程代码执行
漏洞指纹:
https://Seeyonreport/ReportServer?ops_load&seeyonreport
seeyonreport
10.Smasti前台SQL注入
漏洞指纹:
SmartBi
smartbi-WEB-INF/lib/smartbi-BIConfig.jar!/smartbi/config/BIConfig
11.深信服VPN远程代码执行
漏洞指纹:
set-Cookie:TWFID=welcome to ssl vpn
12.深信服VPN的口令爆破
漏洞指纹:
/por/login_auth.csp?apiversion=1sangfor
/cgi-bin/login.cgi?rnd=
13.Fortigate SSL VPN 文件读取/远程代码执行漏洞
漏洞指纹:
Fortigate
4tinet2095866
14.Pulse Secure SSL VPN 远程代码执行漏洞
漏洞指纹:
Pulse Secure
15.Palo Aito GlobalProtect VPN 远程代码执行漏洞
漏洞指纹:
GlobalProtect Portal
16. Citrix Gateway /ADC 远程代码执行漏洞
漏洞指纹:
Citrix Gateway
Citrix Gateway/XSA
17.Thinkphp
漏洞指纹:
Thinkphp
18.Spring系列
漏洞指纹:
X-Application-Context
"Spring-Framework"
19.Phpstudy 后门远程代码
漏洞指纹:
phpstudy 探针
20.Solr 系列漏洞
漏洞指纹:
Solr
21.Tomcat系列
漏洞指纹:
tomcat
8009
ajp
\x04\x01\xf4\x00\x15
22.PHP-fpm 远程代码执行
漏洞指纹:
Nginx
PHP
nextcloud
23.Confluence wiki 远程代码执行
漏洞指纹:
Confluence
24.JBoss系列
漏洞指纹:
JBoss
Jboss
25.Websphere反序列化远程代码执行
漏洞指纹:
Websphere
8880
26.Jenkins系列漏洞
漏洞指纹:
Jenkins
27.redis
漏洞指纹:
6379
28.weblog T3
漏洞指纹:
weblogic
7001
LCom.tangosol.util.extractor
29.宝塔
漏洞指纹:
888/pma