Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/li8u99/Seeyon_exp_plus
seeyon致远OA全漏洞检测与利用
https://github.com/li8u99/Seeyon_exp_plus
Last synced: 22 days ago
JSON representation
seeyon致远OA全漏洞检测与利用
- Host: GitHub
- URL: https://github.com/li8u99/Seeyon_exp_plus
- Owner: li8u99
- Created: 2022-01-20T08:41:25.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2022-04-11T06:27:34.000Z (over 2 years ago)
- Last Synced: 2024-08-05T17:44:09.283Z (4 months ago)
- Language: Python
- Size: 24.4 KB
- Stars: 57
- Watchers: 3
- Forks: 10
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - li8u99/Seeyon_exp_plus - seeyon致远OA全漏洞检测与利用 (Python)
README
![image.png](https://cdn.nlark.com/yuque/0/2021/png/603531/1622620222886-f40c9762-35e8-4547-9004-ecd3d8e52294.png#align=left&display=inline&height=178&margin=%5Bobject%20Object%5D&name=image.png&originHeight=356&originWidth=907&size=18656&status=done&style=none&width=453.5)
偶然发现Summer表哥的这个致远OA全版本检测脚本 https://github.com/Summer177/seeyon_exp 这类专项的检测相比整个扫描器来说更加方便,可以更好的开展漏洞检测。
在之前的基础上结合日常使用进行了优化修改。# 更新日志
2022.01.20:
1、修复致远OA A8 htmlofficeservlet RCE漏洞原验证方式失效的问题。# 工具介绍
**致远OA全漏洞检查与利用工具plus版,收录漏洞如下:**
```
信息泄露:
致远OA A8 状态监控页面信息泄露
致远OA A6 initDataAssess.jsp 用户敏感信息泄露
致远OA A6 createMysql.jsp 数据库敏感信息泄露
致远OA A6 DownExcelBeanServlet 用户敏感信息泄露
致远OA getSessionList.jsp Session泄漏漏洞SQL注入:
致远OA A6 setextno.jsp SQL注入漏洞
致远OA A6 test.jsp SQL注入漏洞文件上传:
致远OA ajax.do 登录绕过&任意文件上传
致远OA Session泄露 任意文件上传漏洞任意文件下载:
致远OA webmail.do任意文件下载
```
**首次使用请安装依赖:**
```
pip3 install -r requirements.txt
```
**使用方法:**
```
Usage:
python3 seeyon_exp.py -u url #漏洞检测
python3 seeyon_exp.py -u url --att #漏洞检测+getshell
python3 seeyon_exp.py -f url.txt #批量漏洞检查
python3 seeyon_exp.py -f url.txt --att #批量漏洞检测+getshellOptions:
-h, --help show this help message and exit
-u URL, --url=URL target url
-f FILE, --file=FILE url file
--att getshell
```
```
python3 seeyon_exp.py -u url
```
![image.png](https://cdn.nlark.com/yuque/0/2021/png/603531/1622621523227-5ef552da-4bf2-4a98-ba4c-0c16292dcc8d.png#align=left&display=inline&height=463&margin=%5Bobject%20Object%5D&name=image.png&originHeight=925&originWidth=1219&size=140406&status=done&style=none&width=609.5)
```
python3 seeyon_exp.py -u url --att
```
![image.png](https://cdn.nlark.com/yuque/0/2021/png/603531/1622625176126-20a05004-b3e4-4188-acbf-c307f661fff5.png#align=left&display=inline&height=462&margin=%5Bobject%20Object%5D&name=image.png&originHeight=924&originWidth=1218&size=138710&status=done&style=none&width=609)**默认使用冰蝎3的webshell,密码为rebeyond**
**扫码结果保存为result.txt,使用批量扫描时,建议先筛选出存活url**
**声明:仅用于授权测试,请勿用于非法用途,违者后果自负!**
参考链接:
```
https://github.com/PeiQi0/PeiQi-WIKI-POC/tree/PeiQi/PeiQi_Wiki/OA%E4%BA%A7%E5%93%81%E6%BC%8F%E6%B4%9E/%E8%87%B4%E8%BF%9COA
```