gobysec / Goby

Attack surface mapping
https://gobies.org/
1.36k stars 149 forks source link

使用/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/参数出现问题 #488

Open 52yao opened 3 months ago

52yao commented 3 months ago

在写 Apache 2.4.49 路径遍历 (CVE-2021-41773)漏洞的脚本时,使用了/icons/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/etc/passwd payload,插件会运行失败。

图片

报错日志: 2024/03/14 15:28:59 127.0.0.1:50612 POST /api/v1/debugPoc

2024/03/14 15:28:59 reload go poc D:\goby-win-x64-2.7.5\golib\exploits\user\Apache_2.4.49_Path_Traversal_CVE_2021_41773.go

2024/03/14 15:28:59 load poc D:\goby-win-x64-2.7.5\golib\exploits\user\Panabit_Panalog_cmdhandle.php_backstage_RCE.go error: 99:12: not enough arguments in call to

2024/03/14 15:28:59 [WARNING] check Vulnerable failed: runtime error: invalid memory address or nil pointer dereference name: Apache 2.4.49 Path Traversal (CVE-2021-41773)

52yao commented 3 months ago

123.58.224.8是vulfocus上的靶场ip地址

gobysec commented 3 months ago

你好,方便的话可更新到最新版Goby,若未解决,请联系微信:gobyteam。