当前位置:网站首页>Know that Chuangyu cloud monitoring - scanv Max update: Ecology OA unauthorized server request forgery and other two vulnerabilities can be detected
Know that Chuangyu cloud monitoring - scanv Max update: Ecology OA unauthorized server request forgery and other two vulnerabilities can be detected
2022-07-03 04:18:00 【Know Chuangyu kcsc】
This update ScanV MAX Vulnerability detection plug-in feature library to version :20220211
New vulnerability detection plug-in 2 individual , Optimize history plugin 7 individual
One 、 New vulnerability detection plug-in
1.Ecology OA Unauthorized server request forgery vulnerability , Plug in update time :2022 year 02 month 11 Japan
2.Microweber Information leak vulnerability (CVE-2022-0281), Plug in update time :2022 year 02 month 11 Japan
Vulnerability related information :
1.Ecology OA Unauthorized server request forgery vulnerability
Vulnerability plug-in update time :
2022 year 02 month 11 Japan
Vulnerability level :
Middle risk
Holes affect :
Pan Wei e-cology OA An unauthorized server request forgery vulnerability exists in an interface of the system , Unauthorized attackers can use this vulnerability to detect the intranet , Attack intranet system .
scope :
according to ZoomEye Cyberspace search engine keywords app:" Pan Wei Cooperative Office OA" Search for potential targets , Get... Together 28,160 strip IP Historical record . It is mainly distributed in China 、 The United States and other countries .
(ZoomEye Search for links :https://www.zoomeye.org/searchResult?q=app%3A%22%E6%B3%9B%E5%BE%AE%20%E5%8D%8F%E5%90%8C%E5%8A%9E%E5%85%ACOA%22)
Global distribution :
Suggested solution :
The official has not fixed this vulnerability , Vulnerabilities can be temporarily URL Add access control , If there is no functional requirement, the interface file can be deleted .
2.Microweber Information leak vulnerability (CVE-2022-0281)
Vulnerability plug-in update time :
2022 year 02 month 11 Japan
The source of the leak :
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0281
Vulnerability level :
Middle risk
Holes affect :
Microweber 1.2.11 Information disclosure vulnerability exists in previous versions . An unauthorized attacker can use this vulnerability to obtain the accounts of all users of the system 、 Email and other information .
scope :
according to ZoomEye Cyberspace search engine keywords microweber Search for potential targets , Get... Together 20,221 strip IP Historical record . Mainly distributed in Bulgaria 、 The United States and other countries .
(ZoomEye Search for links :https://www.zoomeye.org/searchResult?q=microweber)
Global distribution :
Suggested solution :
The official has released an updated patch , Please download and update the affected customers to the safe version in time , Reference link :https://github.com/microweber/microweber
Reference link :
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0281
Two 、 Plug in optimization 7 individual
1、 Optimize “PHPUnit Remote code execution vulnerability ” Detection logic of plug-in , Reduce false alarm rate
2、 Optimize “Jira Unauthorized users enumerate vulnerabilities ” Scanning method of plug-in
3、 Optimize “WordPress DZS Zoomsounds Arbitrary file download vulnerability ” Detection method of plug-in
4、 Optimize “Jira Template injection Code Execution Vulnerability ” plug-in unit , Improve detection speed
5、 Optimize “Apache APISIX Dashboard Unauthorized access vulnerability ” The logical relationship of plug-ins , Reduce false alarm rate
6、 Optimize “GitLab ExifTool Remote command execution vulnerability ” plug-in unit , Improve detection speed
7、 Optimize “Openfire Server side Request Forgery vulnerability ” Detection method of plug-in
The above plug-ins are updated 、 The optimization comes from Chuangyu security intelligent brain big data analysis platform , The optimization and update made after the analysis of recent vulnerability utilization and utilization methods , Support at the same time WebSOC series .
if there be Relevant business requirements
Please scan Contact an expert for advice
Click on Read the original
Turn on ScanV MAX Multidimensional stereo monitoring
边栏推荐
- [set theory] set concept and relationship (true subset | empty set | complete set | power set | number of set elements | power set steps)
- vulnhub HA: Natraj
- js/ts底层实现双击事件
- What is the correct way to compare ntext columns with constant values- What's the right way to compare an NTEXT column with a constant value?
- Five elements of user experience
- [set theory] set operation (Union | intersection | disjoint | relative complement | symmetric difference | absolute complement | generalized union | generalized intersection | set operation priority)
- MySQL timestampdiff interval
- BMZCTF simple_ pop
- Leecode swipe questions and record LCP 18 breakfast combination
- MySQL field userid comma separated save by userid query
猜你喜欢
中移物联网OneOS与OneNET入选《2021年物联网示范项目名单》
竞品分析撰写
因果AI,下一代可信AI的产业升级新范式?
vulnhub HA: Natraj
Causal AI, a new paradigm for industrial upgrading of the next generation of credible AI?
[nlp] - brief introduction to the latest work of spark neural network
Basic MySQL operations
JS实现图片懒加载
【刷题篇】多数元素(超级水王问题)
js实现在可视区内,文字图片动画效果
随机推荐
The longest subarray length with a positive product of 1567 recorded by leecode
Two points -leetcode-540 A single element in an ordered array
Daily question - ugly number
Is it better to speculate in the short term or the medium and long term? Comparative analysis of differences
Five elements of user experience
300+篇文献!一文详解基于Transformer的多模态学习最新进展
CVPR 2022 | 大连理工提出自校准照明框架,用于现实场景的微光图像增强
商城系统搭建完成后需要设置哪些功能
以两列的瀑布流为例,我们应该怎么构建每一列的数组
使用BENCHMARKSQL工具对KingbaseES预热数据时执行:select sys_prewarm(‘NDX_OORDER_2 ‘)报错
智能合约安全审计公司选型分析和审计报告资源下载---国内篇
China Mobile Internet of things oneos and onenet were selected in the list of 2021 Internet of things demonstration projects
Social phobia of contemporary young people (III)
Arduino application development - LCD display GIF dynamic diagram
Leecode swipe questions and record LCP 18 breakfast combination
Fcpx template: sweet memory electronic photo album photo display animation beautiful memory
GFS分布式文件系统(光是遇见已经很美好了)
[set theory] set operation (Union | intersection | disjoint | relative complement | symmetric difference | absolute complement | generalized union | generalized intersection | set operation priority)
[untitled] 2022 safety production supervisor examination question bank and simulated safety production supervisor examination questions
Which Bluetooth headset is cost-effective? Four Bluetooth headsets with high cost performance are recommended