mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2026-05-09 14:27:36 +08:00
upload img md rb file
This commit is contained in:
Binary file not shown.
|
After Width: | Height: | Size: 50 KiB |
Binary file not shown.
|
After Width: | Height: | Size: 32 KiB |
Binary file not shown.
|
After Width: | Height: | Size: 32 KiB |
Binary file not shown.
|
After Width: | Height: | Size: 82 KiB |
Binary file not shown.
|
After Width: | Height: | Size: 75 KiB |
File diff suppressed because one or more lines are too long
@@ -2,14 +2,20 @@
|
||||
### CVE-2017-7269 远程代码执行回显验证
|
||||
|
||||
---
|
||||
我们团队对此次 CVE-2017-7269 漏洞的分析报告: https://ht-sec.org/cve-2017-7269-vulnerabilities/
|
||||
我们团队对此次 CVE-2017-7269(IIS6-0远程命令执行漏洞) 漏洞的分析报告: https://ht-sec.org/cve-2017-7269-vulnerabilities/
|
||||
|
||||
默认PoC 只能弹`calc.exe` ,现在修改成可以响应请求,命令格式为:<br/>
|
||||
|
||||
CVE-2017-7269_remote_echo.py ip_address port
|
||||
`CVE-2017-7269_remote_echo.py ip_address port`
|
||||
|
||||
<br/>
|
||||
|
||||
### 利用条件
|
||||
|
||||
- iis6.0
|
||||
- 开启WebDav功能(具体为PROPFIND方法,成功则返回207或者200)
|
||||
- windows server 2003 R2
|
||||
|
||||
效果如下:<br/>
|
||||
|
||||

|
||||
|
||||
File diff suppressed because one or more lines are too long
Reference in New Issue
Block a user