Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

使用/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/参数出现问题 #488

Open
52yao opened this issue Mar 14, 2024 · 2 comments
Open
Labels

Comments

@52yao
Copy link

52yao commented Mar 14, 2024

在写 Apache 2.4.49 路径遍历 (CVE-2021-41773)漏洞的脚本时,使用了/icons/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/etc/passwd payload,插件会运行失败。

图片

报错日志:
2024/03/14 15:28:59 127.0.0.1:50612 POST /api/v1/debugPoc

2024/03/14 15:28:59 reload go poc D:\goby-win-x64-2.7.5\golib\exploits\user\Apache_2.4.49_Path_Traversal_CVE_2021_41773.go

2024/03/14 15:28:59 load poc D:\goby-win-x64-2.7.5\golib\exploits\user\Panabit_Panalog_cmdhandle.php_backstage_RCE.go error: 99:12: not enough arguments in call to

2024/03/14 15:28:59 [WARNING] check Vulnerable failed: runtime error: invalid memory address or nil pointer dereference name: Apache 2.4.49 Path Traversal (CVE-2021-41773)

@52yao
Copy link
Author

52yao commented Mar 14, 2024

123.58.224.8是vulfocus上的靶场ip地址

@gobysec
Copy link
Owner

gobysec commented Mar 14, 2024

你好,方便的话可更新到最新版Goby,若未解决,请联系微信:gobyteam。

@gobysec gobysec added the fixed label Jun 20, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants