From 155d62a415c7f1f60936cc7c3b3314a4fdf7272a Mon Sep 17 00:00:00 2001 From: hktalent <18223385+hktalent@users.noreply.github.com> Date: Tue, 31 Oct 2023 11:28:27 +0800 Subject: [PATCH] fixed dir for windows 2023-10-31 --- .../yaml/Fortinet FortiOS/CVE-2016-3978.yaml | 45 +++++++++++++++ .../yaml/Fortinet FortiOS/CVE-2018-13379.yaml | 39 +++++++++++++ .../yaml/Fortinet FortiOS/CVE-2018-13380.yaml | 57 +++++++++++++++++++ .../CVE-2021-33544.yaml" | 0 .../ruijie-nbr1300g-exposure.yaml | 0 .../ruijie-networks-lfi.yaml | 0 .../CVE-2020-7247.yaml | 0 .../CVE-2019-11510.yaml | 0 .../pulse-secure-panel.yaml | 0 .../CVE-2017-16806.yaml | 0 .../CVE-2020-13117.yaml | 0 .../samsung-wlan-ap-lfi.yaml | 0 .../samsung-wlan-ap-rce.yaml | 0 .../samsung-wlan-ap-xss.yaml | 0 .../samsung-wlan-default-login.yaml | 0 .../WordPress}/CVE-2021-24987.yaml | 0 .../CVE-2018-1000533.yaml | 0 17 files changed, 141 insertions(+) create mode 100755 config/51pwn/yaml/Fortinet FortiOS/CVE-2016-3978.yaml create mode 100755 config/51pwn/yaml/Fortinet FortiOS/CVE-2018-13379.yaml create mode 100755 config/51pwn/yaml/Fortinet FortiOS/CVE-2018-13380.yaml rename "config/51pwn/yaml/Geutebr\303\274ck G-Cam E2 /CVE-2021-33544.yaml" => "config/51pwn/yaml/Geutebr\303\274ck G-Cam E2/CVE-2021-33544.yaml" (100%) rename config/51pwn/yaml/{Networks Switch => Networks Switch}/ruijie-nbr1300g-exposure.yaml (100%) rename config/51pwn/yaml/{Networks Switch => Networks Switch}/ruijie-networks-lfi.yaml (100%) rename config/51pwn/yaml/{Openbsd Opensmtpd => Openbsd Opensmtpd}/CVE-2020-7247.yaml (100%) rename config/51pwn/yaml/{Pulse Secure => Pulse Secure}/CVE-2019-11510.yaml (100%) rename config/51pwn/yaml/{Pulse Secure => Pulse Secure}/pulse-secure-panel.yaml (100%) rename config/51pwn/yaml/{Ulterius => Ulterius}/CVE-2017-16806.yaml (100%) rename config/51pwn/yaml/{Wavlink WN575A4 => Wavlink WN575A4}/CVE-2020-13117.yaml (100%) rename config/51pwn/yaml/{Wlan AP => Wlan AP}/samsung-wlan-ap-lfi.yaml (100%) rename config/51pwn/yaml/{Wlan AP => Wlan AP}/samsung-wlan-ap-rce.yaml (100%) rename config/51pwn/yaml/{Wlan AP => Wlan AP}/samsung-wlan-ap-xss.yaml (100%) rename config/51pwn/yaml/{Wlan AP => Wlan AP}/samsung-wlan-default-login.yaml (100%) rename config/51pwn/yaml/{WordPress => WordPress/WordPress}/CVE-2021-24987.yaml (100%) rename config/51pwn/yaml/{klaussilveira GitList => klaussilveira GitList}/CVE-2018-1000533.yaml (100%) diff --git a/config/51pwn/yaml/Fortinet FortiOS/CVE-2016-3978.yaml b/config/51pwn/yaml/Fortinet FortiOS/CVE-2016-3978.yaml new file mode 100755 index 000000000..9826fdabd --- /dev/null +++ b/config/51pwn/yaml/Fortinet FortiOS/CVE-2016-3978.yaml @@ -0,0 +1,45 @@ +id: CVE-2016-3978 +info: + name: FortiOS (Fortinet) - Open Redirect and XSS + author: + - l0ne1y + tags: + - cve + - cve2016 + - redirect + - fortinet + - fortios + description: |- + Fortinet FortiOS Web User Interface 跨站脚本漏洞 + Fortinet FortiOS是美国飞塔(Fortinet)公司开发的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSL VPN、Web内容过滤和反垃圾邮件等多种安全功能。 + + Fortinet FortiOS的Web User Interface(WebUI)中存在安全漏洞。远程攻击者可借助登录时的‘redirect’参数利用该漏洞将用户重定向到任意Web站点,实施钓鱼攻击或跨站脚本攻击。以下版本受到影响:Fortinet FortiOS 5.0.13之前5.0.x版本,5.2.3之前5.2.x版本,5.4.0之前5.4.x版本。 + reference: + - https://seclists.org/fulldisclosure/2016/mar/68 + - https://nvd.nist.gov/vuln/detail/cve-2016-3978 + - http://seclists.org/fulldisclosure/2016/mar/68 + - http://www.fortiguard.com/advisory/fortios-open-redirect-vulnerability + severity: medium + classification: + cve-id: + - cve-2016-3978 + cwe-id: + - cwe-79 + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + remediation: |- + **官方修复方案** + 目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: + https://fortiguard.com/advisory/fortios-open-redirect-vulnerability + + **临时修复方案** + 1、对输入(和URL参数)进行过滤,对输出进行编码,白名单和黑名单结合。也就是对提交的所有内容进行过滤,对url中的参数进行过滤,过滤掉会导致脚本执行的相关内容;然后对动态输出到页面的内容进行html编码,使脚本无法在浏览器中执行。虽然对输入过滤可以被绕过,但是也还是会拦截很大一部分的XSS攻击;最后对字符进行白名单或者黑名单限制。 +requests: +- matchers: + - type: regex + part: header + regex: + - (?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$ + path: + - '{{BaseURL}}/login?redir=http://www.example.com' + method: GET diff --git a/config/51pwn/yaml/Fortinet FortiOS/CVE-2018-13379.yaml b/config/51pwn/yaml/Fortinet FortiOS/CVE-2018-13379.yaml new file mode 100755 index 000000000..5bf366f19 --- /dev/null +++ b/config/51pwn/yaml/Fortinet FortiOS/CVE-2018-13379.yaml @@ -0,0 +1,39 @@ +id: CVE-2018-13379 +info: + name: Fortinet FortiOS - Credentials Disclosure + author: + - l0ne1y + tags: + - cve + - cve2018 + - fortios + description: |- + Fortinet FortiOS 路径遍历漏洞 + Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。 + + Fortinet FortiOS 5.6.3版本至5.6.7版本和6.0.0版本至6.0.4版本中的SSL VPN Web门户存在路径遍历漏洞。该漏洞源于网络系统或产品未能正确地过滤资源或文件路径中的特殊元素。攻击者可利用该漏洞访问受限目录之外的位置。 + reference: + - https://fortiguard.com/advisory/fg-ir-18-384 + - https://www.fortiguard.com/psirt/fg-ir-20-233 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-13379 + severity: critical + classification: + cve-id: + - cve-2018-13379 + cwe-id: + - cwe-22 + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + remediation: "**官方修复方案**\n目前厂商已发布升级补丁以修复漏洞,补丁获取链接:\nhttps://fortiguard.com/psirt/FG-IR-18-384\n\n**临时修复方案**\n1、系统开发阶段的防御,在系统开发阶段应充分考虑系统的安全性,对目录遍历漏洞来说,需对用户提交的内容进行严格的过滤,这里主要指过滤目录跳转符,字符截断符,dir命令等。\n2、系统运行阶段的防御,系统运维人员需有强烈的安全意识,他们的一举一动都会影响用户的个人隐私信息安全。对系统运维人员来说,部署新的业务系统或者安装新的软件或应用后应通过web扫描工具积极查找系统是否存在目录遍历漏洞,尽可能不要在服务器上安装与业务不相关的第三方软件以避免引入目录遍历漏洞。除此之外,还应该合理配置web服务器(禁止目录浏览,分配好目录权限等)并积极关注所使用的各种软件和应用的版本发布情况,及时升级新的软件版本。'\n3、服务器配置,为更好的保护系统安全,实际生产环境和测试开发环境应该隔离。在生产环境中的任何改动,都需要严格遵循变更管理流程,做到执行人、执行时间、执行对象和具体改动均记录在案,并有企业信息安全部门进行事前审核和事后审计。技术人员一般不要直接调试生产系统,可以在测试环境中调试完成后再更新生产系统,以避免调试过程中开启某些接口、更改某些配置或者保存某些调试信息造成安全隐患。如果非要在线调试生产系统,而且需要保存调试信息时,应避免将调试信息直接保存到服务器本地,同时调试完成后应第一时间删除相关调试信息并恢复系统配置。\n + \ 1)IIS:打开 IIS 管理器,然后导航至您要管理的级别;在“功能视图”中,双击“目录浏览”;在“操作”窗格中,选择“目录浏览”功能,单击“禁用”。\n + \ 2)Nginx:找到Nginx配置文件中的“autoindex”,设置为“off”,然后重启Nginx。\n 3)Apache:修配置文件httpd.conf,把:Options + Indexes FollowSymLinks 改为:Options -Indexes FollowSymLinks ,然后重启Apache。\n 4)Tomcat:在应用的WEB-INF目录找到web.xml配置文件,将“listings”参数的初始化值设置为“false”,然后重启Tomcat。 + \ \n4、安全设备的防御,进行目录遍历攻击时,攻击者基本都会使用目录跳转符,同时可能配合使用字符截断符,dir命令等。对专业的安全设备来说通过检测特定语法下的目录跳转符,字符截断符,以及与查看目录相关的命令即可识别各种目录遍历攻击。部署专业的安全设备不仅可以很好的保护业务系统自身的目录遍历漏洞,同时还能防御web服务器和服务器上其他非业务相关的第三方应用漏洞引发的目录遍历攻击。" +requests: +- matchers: + - type: word + words: + - var fgt_lang + path: + - '{{BaseURL}}/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession' + method: GET diff --git a/config/51pwn/yaml/Fortinet FortiOS/CVE-2018-13380.yaml b/config/51pwn/yaml/Fortinet FortiOS/CVE-2018-13380.yaml new file mode 100755 index 000000000..8030a0104 --- /dev/null +++ b/config/51pwn/yaml/Fortinet FortiOS/CVE-2018-13380.yaml @@ -0,0 +1,57 @@ +id: CVE-2018-13380 +info: + name: Fortinet FortiOS Cross-Site Scripting + author: + - l0ne1y + tags: + - cve + - cve2018 + - fortios + - xss + - fortinet + description: |- + Fortinet FortiOS 跨站脚本漏洞 + Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。 + + Fortinet FortiOS 6.0.0版本至6.0.4版本、5.6.0版本至5.6.7版本和5.4及之前版本中的SSL VPN Web门户存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。 + reference: + - https://nvd.nist.gov/vuln/detail/cve-2018-13380 + - https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html + - https://fortiguard.com/advisory/fg-ir-18-383 + - https://fortiguard.com/advisory/fg-ir-20-230 + severity: medium + classification: + cve-id: + - cve-2018-13380 + cwe-id: + - cwe-79 + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + remediation: |- + **官方修复方案** + 目前厂商已发布升级补丁以修复漏洞,补丁获取链接: + https://fortiguard.com/psirt/FG-IR-18-383 + + **临时修复方案** + 对输入(和URL参数)进行过滤,对输出进行编码,白名单和黑名单结合。也就是对提交的所有内容进行过滤,对url中的参数进行过滤,过滤掉会导致脚本执行的相关内容;然后对动态输出到页面的内容进行html编码,使脚本无法在浏览器中执行。虽然对输入过滤可以被绕过,但是也还是会拦截很大一部分的XSS攻击;最后对字符进行白名单或者黑名单限制。 +requests: +- matchers: + - type: word + condition: or + part: body + words: + - + - + - type: word + part: header + negative: true + words: + - application/json + - type: status + status: + - 200 + matchers-condition: and + path: + - '{{BaseURL}}/message?title=x&msg=%26%23%3Csvg/onload=alert(1337)%3E%3B' + - '{{BaseURL}}/remote/error?errmsg=ABABAB--%3E%3Cscript%3Ealert(1337)%3C/script%3E' + method: GET diff --git "a/config/51pwn/yaml/Geutebr\303\274ck G-Cam E2 /CVE-2021-33544.yaml" "b/config/51pwn/yaml/Geutebr\303\274ck G-Cam E2/CVE-2021-33544.yaml" similarity index 100% rename from "config/51pwn/yaml/Geutebr\303\274ck G-Cam E2 /CVE-2021-33544.yaml" rename to "config/51pwn/yaml/Geutebr\303\274ck G-Cam E2/CVE-2021-33544.yaml" diff --git a/config/51pwn/yaml/Networks Switch /ruijie-nbr1300g-exposure.yaml b/config/51pwn/yaml/Networks Switch/ruijie-nbr1300g-exposure.yaml similarity index 100% rename from config/51pwn/yaml/Networks Switch /ruijie-nbr1300g-exposure.yaml rename to config/51pwn/yaml/Networks Switch/ruijie-nbr1300g-exposure.yaml diff --git a/config/51pwn/yaml/Networks Switch /ruijie-networks-lfi.yaml b/config/51pwn/yaml/Networks Switch/ruijie-networks-lfi.yaml similarity index 100% rename from config/51pwn/yaml/Networks Switch /ruijie-networks-lfi.yaml rename to config/51pwn/yaml/Networks Switch/ruijie-networks-lfi.yaml diff --git a/config/51pwn/yaml/Openbsd Opensmtpd /CVE-2020-7247.yaml b/config/51pwn/yaml/Openbsd Opensmtpd/CVE-2020-7247.yaml similarity index 100% rename from config/51pwn/yaml/Openbsd Opensmtpd /CVE-2020-7247.yaml rename to config/51pwn/yaml/Openbsd Opensmtpd/CVE-2020-7247.yaml diff --git a/config/51pwn/yaml/Pulse Secure /CVE-2019-11510.yaml b/config/51pwn/yaml/Pulse Secure/CVE-2019-11510.yaml similarity index 100% rename from config/51pwn/yaml/Pulse Secure /CVE-2019-11510.yaml rename to config/51pwn/yaml/Pulse Secure/CVE-2019-11510.yaml diff --git a/config/51pwn/yaml/Pulse Secure /pulse-secure-panel.yaml b/config/51pwn/yaml/Pulse Secure/pulse-secure-panel.yaml similarity index 100% rename from config/51pwn/yaml/Pulse Secure /pulse-secure-panel.yaml rename to config/51pwn/yaml/Pulse Secure/pulse-secure-panel.yaml diff --git a/config/51pwn/yaml/Ulterius /CVE-2017-16806.yaml b/config/51pwn/yaml/Ulterius/CVE-2017-16806.yaml similarity index 100% rename from config/51pwn/yaml/Ulterius /CVE-2017-16806.yaml rename to config/51pwn/yaml/Ulterius/CVE-2017-16806.yaml diff --git a/config/51pwn/yaml/Wavlink WN575A4 /CVE-2020-13117.yaml b/config/51pwn/yaml/Wavlink WN575A4/CVE-2020-13117.yaml similarity index 100% rename from config/51pwn/yaml/Wavlink WN575A4 /CVE-2020-13117.yaml rename to config/51pwn/yaml/Wavlink WN575A4/CVE-2020-13117.yaml diff --git a/config/51pwn/yaml/Wlan AP /samsung-wlan-ap-lfi.yaml b/config/51pwn/yaml/Wlan AP/samsung-wlan-ap-lfi.yaml similarity index 100% rename from config/51pwn/yaml/Wlan AP /samsung-wlan-ap-lfi.yaml rename to config/51pwn/yaml/Wlan AP/samsung-wlan-ap-lfi.yaml diff --git a/config/51pwn/yaml/Wlan AP /samsung-wlan-ap-rce.yaml b/config/51pwn/yaml/Wlan AP/samsung-wlan-ap-rce.yaml similarity index 100% rename from config/51pwn/yaml/Wlan AP /samsung-wlan-ap-rce.yaml rename to config/51pwn/yaml/Wlan AP/samsung-wlan-ap-rce.yaml diff --git a/config/51pwn/yaml/Wlan AP /samsung-wlan-ap-xss.yaml b/config/51pwn/yaml/Wlan AP/samsung-wlan-ap-xss.yaml similarity index 100% rename from config/51pwn/yaml/Wlan AP /samsung-wlan-ap-xss.yaml rename to config/51pwn/yaml/Wlan AP/samsung-wlan-ap-xss.yaml diff --git a/config/51pwn/yaml/Wlan AP /samsung-wlan-default-login.yaml b/config/51pwn/yaml/Wlan AP/samsung-wlan-default-login.yaml similarity index 100% rename from config/51pwn/yaml/Wlan AP /samsung-wlan-default-login.yaml rename to config/51pwn/yaml/Wlan AP/samsung-wlan-default-login.yaml diff --git a/config/51pwn/yaml/WordPress /CVE-2021-24987.yaml b/config/51pwn/yaml/WordPress/WordPress/CVE-2021-24987.yaml similarity index 100% rename from config/51pwn/yaml/WordPress /CVE-2021-24987.yaml rename to config/51pwn/yaml/WordPress/WordPress/CVE-2021-24987.yaml diff --git a/config/51pwn/yaml/klaussilveira GitList /CVE-2018-1000533.yaml b/config/51pwn/yaml/klaussilveira GitList/CVE-2018-1000533.yaml similarity index 100% rename from config/51pwn/yaml/klaussilveira GitList /CVE-2018-1000533.yaml rename to config/51pwn/yaml/klaussilveira GitList/CVE-2018-1000533.yaml