
漏洞复现
文章平均质量分 89
一些漏洞复现的学习记录
Mitch311
我与春风皆过客, 你携秋水揽星河。
展开
专栏收录文章
- 默认排序
- 最新发布
- 最早发布
- 最多阅读
- 最少阅读
-
【漏洞复现】CVE-2022-41678 Arbitrary JMX Service Invocation with Web Interface
Apache ActiveMQ prior to 5.16.5, 5.17.3, there is a authenticated RCE exists in the Jolokia `/api/jolokia`.原创 2024-12-27 17:51:02 · 1351 阅读 · 0 评论 -
【漏洞复现】CVE-2016-3088 Arbitrary File Writing
The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.原创 2024-12-27 17:47:10 · 937 阅读 · 0 评论 -
【漏洞复现】CVE-2015-5254 Java Object Injection (with Known Gadgets)
Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object.原创 2024-12-26 10:41:59 · 972 阅读 · 0 评论 -
【漏洞复现】CVE-2014-3120 & CVE-2015-1427 Expression Injection
老版本的Elasticsearch允许通过JSON请求传入动态脚本,攻击者可以构造包含MVEL代码的查询,从而在服务器上执行任意命令。原创 2024-12-26 10:36:30 · 2113 阅读 · 0 评论 -
【漏洞复现】CVE-2015-5531 Arbitrary File Reading
Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.原创 2024-12-24 16:48:52 · 1162 阅读 · 0 评论 -
【漏洞复现】CVE-2015-3337 Arbitrary File Reading
Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2, when a site plugin is enabled, allows remote attackers to read arbitrary files via unspecified vectors.原创 2024-12-24 16:46:52 · 1378 阅读 · 0 评论 -
【漏洞复现】CVE-2021-45788 SQL Injection
Time-based SQL Injection vulnerabilities were found in Metersphere v1.15.4 via the "orders" parameter.Authenticated users can control the parameters in the "order by" statement, which causing SQL injection.原创 2024-12-23 14:34:22 · 1234 阅读 · 0 评论 -
【漏洞复现】CVE-2022-23544 SSRF
MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.0 are subject to a Server-Side Request Forgery that leads to Cross-Site Scripting. A S原创 2024-12-23 14:28:54 · 1020 阅读 · 0 评论 -
【漏洞复现】CVE-2023-37461 Arbitrary File Writing
Metersphere is an opensource testing framework. Files uploaded to Metersphere may define a `belongType` value with a relative path like `../../../../` which may cause metersphere to attempt to overwrite an existing file in the defined location or to create原创 2024-12-21 13:10:27 · 1169 阅读 · 0 评论 -
【漏洞复现】CVE-2022-46178 Arbitrary File Writing
MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.1 allow users to upload a file, but do not validate the file name, which may lead to u原创 2024-12-21 13:03:52 · 1053 阅读 · 0 评论 -
【漏洞复现】CVE-2020-23079 & CVE-2022-32995 SSRF
Halo CMS v1.5.3 was discovered to contain a Server-Side Request Forgery (SSRF) via the template remote download function.原创 2024-12-16 15:59:50 · 907 阅读 · 0 评论 -
【漏洞复现】CVE-2022-45206 & CVE-2023-38905 SQL Injection
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/duplicate/check.原创 2024-12-20 12:24:57 · 2502 阅读 · 0 评论 -
【漏洞复现】CVE-2023-29944 Expression Injection
Metersphere v1.20.20-lts-79d354a6 is vulnerable to Remote Command Execution. The system command reverse-shell can be executed at the custom code snippet function of the metersphere system workbench.原创 2024-12-20 13:05:08 · 642 阅读 · 0 评论 -
【漏洞复现】CVE-2022-28074 Cross-Site Scripting
Halo-1.5.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via \admin\index.html#/system/tools.原创 2024-12-16 16:14:23 · 905 阅读 · 0 评论 -
【漏洞复现】CVE-2022-26619 & CVE-2022-32994 Arbitrary File Upload
Halo Blog CMS v1.4.17 was discovered to allow attackers to upload arbitrary files via the Attachment Upload function.Halo CMS v1.5.3 was discovered to contain an arbitrary file upload vulnerability via the component /api/admin/attachments/upload.原创 2024-12-11 21:38:10 · 883 阅读 · 0 评论 -
【漏洞复现】CVE-2024-30188 Arbitrary File Writing
File read and write vulnerability in Apache DolphinScheduler , authenticated users can illegally access additional resource files. This issue affects Apache DolphinScheduler: from 3.1.0 before 3.2.2. Users are recommended to upgrade to version 3.2.2, which原创 2024-12-08 16:38:46 · 946 阅读 · 0 评论 -
【漏洞复现】CVE-2023-51770 Arbitrary File Reading
Arbitrary File Read Vulnerability in Apache Dolphinscheduler. This issue affects Apache DolphinScheduler: before 3.2.1. We recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue.原创 2024-12-08 16:33:41 · 793 阅读 · 0 评论 -
【漏洞复现】CVE-2024-23320 Expression Injection
Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can cause arbitrary, unsandboxed javascript to be executed on the server. This issue is a legacy of CVE-2023-49299. We didn't fix it completely in CVE-2023-49299, and原创 2024-11-30 18:05:30 · 1313 阅读 · 0 评论 -
【漏洞复现】CVE-2023-49299 Expression Injection
Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can cause arbitrary, unsandboxed javascript to be executed on the server.This issue affects Apache DolphinScheduler: until 3.1.9. Users are recommended to upgrade to原创 2024-11-30 17:51:26 · 1284 阅读 · 6 评论 -
【漏洞复现】CVE-2022-43396
In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf.原创 2024-11-27 23:46:01 · 768 阅读 · 0 评论 -
【漏洞复现】CVE-2022-24697
Kylin's cube designer function has a command injection vulnerability when overwriting system parameters in the configuration overwrites menu. RCE can be implemented by closing the single quotation marks around the parameter value of “-- conf=” to inject an原创 2024-11-27 23:41:52 · 1386 阅读 · 0 评论 -
【漏洞复现】CVE-2020-13925
Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibility to原创 2024-11-26 22:58:37 · 1271 阅读 · 0 评论 -
【漏洞复现】CVE-2021-45456
Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService.原创 2024-11-26 23:05:40 · 1496 阅读 · 0 评论 -
【漏洞复现】CVE-2020-1956
Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.原创 2024-11-25 23:07:02 · 1167 阅读 · 0 评论