当前位置:网站首页>Know that Chuangyu cloud monitoring - scanv Max update: Ecology OA unauthorized server request forgery and other two vulnerabilities can be detected
Know that Chuangyu cloud monitoring - scanv Max update: Ecology OA unauthorized server request forgery and other two vulnerabilities can be detected
2022-07-03 04:18:00 【Know Chuangyu kcsc】
This update ScanV MAX Vulnerability detection plug-in feature library to version :20220211
New vulnerability detection plug-in 2 individual , Optimize history plugin 7 individual
One 、 New vulnerability detection plug-in
1.Ecology OA Unauthorized server request forgery vulnerability , Plug in update time :2022 year 02 month 11 Japan
2.Microweber Information leak vulnerability (CVE-2022-0281), Plug in update time :2022 year 02 month 11 Japan
Vulnerability related information :
1.Ecology OA Unauthorized server request forgery vulnerability
Vulnerability plug-in update time :
2022 year 02 month 11 Japan
Vulnerability level :
Middle risk
Holes affect :
Pan Wei e-cology OA An unauthorized server request forgery vulnerability exists in an interface of the system , Unauthorized attackers can use this vulnerability to detect the intranet , Attack intranet system .
scope :
according to ZoomEye Cyberspace search engine keywords app:" Pan Wei Cooperative Office OA" Search for potential targets , Get... Together 28,160 strip IP Historical record . It is mainly distributed in China 、 The United States and other countries .
(ZoomEye Search for links :https://www.zoomeye.org/searchResult?q=app%3A%22%E6%B3%9B%E5%BE%AE%20%E5%8D%8F%E5%90%8C%E5%8A%9E%E5%85%ACOA%22)
Global distribution :
Suggested solution :
The official has not fixed this vulnerability , Vulnerabilities can be temporarily URL Add access control , If there is no functional requirement, the interface file can be deleted .
2.Microweber Information leak vulnerability (CVE-2022-0281)
Vulnerability plug-in update time :
2022 year 02 month 11 Japan
The source of the leak :
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0281
Vulnerability level :
Middle risk
Holes affect :
Microweber 1.2.11 Information disclosure vulnerability exists in previous versions . An unauthorized attacker can use this vulnerability to obtain the accounts of all users of the system 、 Email and other information .
scope :
according to ZoomEye Cyberspace search engine keywords microweber Search for potential targets , Get... Together 20,221 strip IP Historical record . Mainly distributed in Bulgaria 、 The United States and other countries .
(ZoomEye Search for links :https://www.zoomeye.org/searchResult?q=microweber)
Global distribution :
Suggested solution :
The official has released an updated patch , Please download and update the affected customers to the safe version in time , Reference link :https://github.com/microweber/microweber
Reference link :
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0281
Two 、 Plug in optimization 7 individual
1、 Optimize “PHPUnit Remote code execution vulnerability ” Detection logic of plug-in , Reduce false alarm rate
2、 Optimize “Jira Unauthorized users enumerate vulnerabilities ” Scanning method of plug-in
3、 Optimize “WordPress DZS Zoomsounds Arbitrary file download vulnerability ” Detection method of plug-in
4、 Optimize “Jira Template injection Code Execution Vulnerability ” plug-in unit , Improve detection speed
5、 Optimize “Apache APISIX Dashboard Unauthorized access vulnerability ” The logical relationship of plug-ins , Reduce false alarm rate
6、 Optimize “GitLab ExifTool Remote command execution vulnerability ” plug-in unit , Improve detection speed
7、 Optimize “Openfire Server side Request Forgery vulnerability ” Detection method of plug-in
The above plug-ins are updated 、 The optimization comes from Chuangyu security intelligent brain big data analysis platform , The optimization and update made after the analysis of recent vulnerability utilization and utilization methods , Support at the same time WebSOC series .
if there be Relevant business requirements
Please scan Contact an expert for advice
Click on Read the original
Turn on ScanV MAX Multidimensional stereo monitoring
边栏推荐
- 【刷题篇】 找出第 K 小的数对距离
- CVPR 2022 | 大连理工提出自校准照明框架,用于现实场景的微光图像增强
- [nlp] - brief introduction to the latest work of spark neural network
- Bisher - based on SSM pet adoption center
- Introduction of pointer variables in function parameters
- Kubernetes源码分析(一)
- MongoDB 慢查询语句优化分析策略
- [brush questions] find the number pair distance with the smallest K
- [文献阅读] Sparsity in Deep Learning: Pruning and growth for efficient inference and training in NN
- PostgreSQL database high availability Patroni source code learning - etcd class
猜你喜欢
Database management tool, querious direct download
[fxcg] inflation differences will still lead to the differentiation of monetary policies in various countries
Five elements of user experience
JS实现图片懒加载
中移物联网OneOS与OneNET入选《2021年物联网示范项目名单》
【刷题篇】多数元素(超级水王问题)
Which Bluetooth headset is cost-effective? Four Bluetooth headsets with high cost performance are recommended
Redis persistence principle
CVPR 2022 | Dalian Technology propose un cadre d'éclairage auto - étalonné pour l'amélioration de l'image de faible luminosité de la scène réelle
Arduino application development - LCD display GIF dynamic diagram
随机推荐
vim 的实用操作
CVPR 2022 | Dalian Institute of technology proposes a self calibration lighting framework for low light level image enhancement of real scenes
Nat. Comm. | 使用Tensor-cell2cell对细胞通讯进行环境感知去卷积
[Chongqing Guangdong education] reference materials for design and a better life of Zhongyuan Institute of science and technology
300+ documents! This article explains the latest progress of multimodal learning based on transformer
使用BENCHMARKSQL工具对KingbaseES预热数据时执行:select sys_prewarm(‘NDX_OORDER_2 ‘)报错
以两列的瀑布流为例,我们应该怎么构建每一列的数组
CVPR 2022 | 大連理工提出自校准照明框架,用於現實場景的微光圖像增强
Introduction to eth
解决bp中文乱码
Five elements of user experience
arthas watch 抓取入参的某个字段/属性
[home push IMessage] software installation virtual host rental tothebuddy delay
Bisher - based on SSM pet adoption center
使用BENCHMARKSQL工具对kingbasees并发测试时kill掉主进程成功后存在子线程未及时关闭
What's wrong with SD card data damage? How to recover SD card data damage
[set theory] set identities (idempotent law | exchange law | combination law | distribution rate | De Morgan law | absorption rate | zero law | identity | exclusion law | contradiction law | complemen
树莓派如何连接WiFi
Introduction of pointer variables in function parameters
服务器无法远程连接原因分析