Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/qi4L/seeyonerExp
致远OA利用工具
https://github.com/qi4L/seeyonerExp
Last synced: 3 months ago
JSON representation
致远OA利用工具
- Host: GitHub
- URL: https://github.com/qi4L/seeyonerExp
- Owner: qi4L
- License: mit
- Created: 2023-07-14T08:28:39.000Z (over 1 year ago)
- Default Branch: master
- Last Pushed: 2023-07-14T09:20:11.000Z (over 1 year ago)
- Last Synced: 2023-07-14T09:20:12.183Z (over 1 year ago)
- Language: Go
- Size: 0 Bytes
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Codeowners: .github/CODEOWNERS
Awesome Lists containing this project
- awesome-hacking-lists - qi4L/seeyonerExp - 致远OA利用工具 (Go)
README
# seeyoner
致远OA漏洞利用工具## Usage
```
PS C:\> seeyonerExp.exe -h
一个简单的致远OA安全测试工具,目的是为了协助漏洞自查、修复工作。Usage:
Seeyoner [command]Available Commands:
exploit 漏洞利用
help Help about any command
list 列出所有漏洞信息
scan 漏洞检测Flags:
-h, --help help for SeeyonerUse "Seeyoner [command] --help" for more information about a command.
```
### scan
全漏洞探测:
```
seeyonerExp.exe -u http://xxx.com -i 0
```指定漏洞探测:
`-vn`指定漏洞编号,可通过`-show`参数查看:
```
D:\>seeyonerExp.exe list漏洞列表:
1、seeyon<8.0_fastjson反序列化
2、thirdpartyController.do管理员session泄露
3、webmail.do任意文件下载(CNVD-2020-62422)
4、ajax.do未授权&任意文件上传
5、getSessionList泄露Session
6、htmlofficeservlet任意文件上传
7、initDataAssess.jsp信息泄露
8、DownExcelBeanServlet信息泄露
9、createMysql.jsp数据库信息泄露
10、test.jsp路径
11、setextno.jsp路径
12、status.jsp路径(状态监控页面)
```
探测seeyon<8.0_fastjson反序列化漏洞:
```
seeyonerExp.exe scan -u http://xxx.com -i 1
```### run
以Session泄露+zip文件上传解压为例,指定编号为`2`:
```
seeyonerExp.exe exploit -u http://xxxx.com -i 2
```