当前位置:网站首页>Know that Chuangyu cloud monitoring - scanv Max update: Ecology OA unauthorized server request forgery and other two vulnerabilities can be detected
Know that Chuangyu cloud monitoring - scanv Max update: Ecology OA unauthorized server request forgery and other two vulnerabilities can be detected
2022-07-03 04:18:00 【Know Chuangyu kcsc】

This update ScanV MAX Vulnerability detection plug-in feature library to version :20220211
New vulnerability detection plug-in 2 individual , Optimize history plugin 7 individual
One 、 New vulnerability detection plug-in
1.Ecology OA Unauthorized server request forgery vulnerability , Plug in update time :2022 year 02 month 11 Japan
2.Microweber Information leak vulnerability (CVE-2022-0281), Plug in update time :2022 year 02 month 11 Japan
Vulnerability related information :
1.Ecology OA Unauthorized server request forgery vulnerability
Vulnerability plug-in update time :
2022 year 02 month 11 Japan
Vulnerability level :
Middle risk
Holes affect :
Pan Wei e-cology OA An unauthorized server request forgery vulnerability exists in an interface of the system , Unauthorized attackers can use this vulnerability to detect the intranet , Attack intranet system .
scope :
according to ZoomEye Cyberspace search engine keywords app:" Pan Wei Cooperative Office OA" Search for potential targets , Get... Together 28,160 strip IP Historical record . It is mainly distributed in China 、 The United States and other countries .
(ZoomEye Search for links :https://www.zoomeye.org/searchResult?q=app%3A%22%E6%B3%9B%E5%BE%AE%20%E5%8D%8F%E5%90%8C%E5%8A%9E%E5%85%ACOA%22)

Global distribution :

Suggested solution :
The official has not fixed this vulnerability , Vulnerabilities can be temporarily URL Add access control , If there is no functional requirement, the interface file can be deleted .
2.Microweber Information leak vulnerability (CVE-2022-0281)
Vulnerability plug-in update time :
2022 year 02 month 11 Japan
The source of the leak :
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0281
Vulnerability level :
Middle risk
Holes affect :
Microweber 1.2.11 Information disclosure vulnerability exists in previous versions . An unauthorized attacker can use this vulnerability to obtain the accounts of all users of the system 、 Email and other information .
scope :
according to ZoomEye Cyberspace search engine keywords microweber Search for potential targets , Get... Together 20,221 strip IP Historical record . Mainly distributed in Bulgaria 、 The United States and other countries .
(ZoomEye Search for links :https://www.zoomeye.org/searchResult?q=microweber)

Global distribution :

Suggested solution :
The official has released an updated patch , Please download and update the affected customers to the safe version in time , Reference link :https://github.com/microweber/microweber
Reference link :
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0281
Two 、 Plug in optimization 7 individual
1、 Optimize “PHPUnit Remote code execution vulnerability ” Detection logic of plug-in , Reduce false alarm rate
2、 Optimize “Jira Unauthorized users enumerate vulnerabilities ” Scanning method of plug-in
3、 Optimize “WordPress DZS Zoomsounds Arbitrary file download vulnerability ” Detection method of plug-in
4、 Optimize “Jira Template injection Code Execution Vulnerability ” plug-in unit , Improve detection speed
5、 Optimize “Apache APISIX Dashboard Unauthorized access vulnerability ” The logical relationship of plug-ins , Reduce false alarm rate
6、 Optimize “GitLab ExifTool Remote command execution vulnerability ” plug-in unit , Improve detection speed
7、 Optimize “Openfire Server side Request Forgery vulnerability ” Detection method of plug-in
The above plug-ins are updated 、 The optimization comes from Chuangyu security intelligent brain big data analysis platform , The optimization and update made after the analysis of recent vulnerability utilization and utilization methods , Support at the same time WebSOC series .

if there be Relevant business requirements
Please scan Contact an expert for advice


Click on Read the original
Turn on ScanV MAX Multidimensional stereo monitoring
边栏推荐
- Basic syntax of class
- Practical operation of vim
- 竞品分析撰写
- Dismantle a 100000 yuan BYD "Yuan". Come and see what components are in it.
- What is the correct way to compare ntext columns with constant values- What's the right way to compare an NTEXT column with a constant value?
- [literature reading] sparse in deep learning: practicing and growth for effective information and training in NN
- Sklearn data preprocessing
- What are the Bluetooth headsets with good sound quality in 2022? Inventory of four high-quality Bluetooth headsets
- When writing a web project, SmartUpload is used for file upload and new string () is used for transcoding, but in the database, there will still be random codes similar to poker
- [set theory] ordered pair (ordered pair | ordered triple | ordered n ancestor)
猜你喜欢

P35-P41 fourth_ context

300+ documents! This article explains the latest progress of multimodal learning based on transformer

CVPR 2022 | Dalian Technology propose un cadre d'éclairage auto - étalonné pour l'amélioration de l'image de faible luminosité de la scène réelle

Which Bluetooth headset is good about 400? Four Bluetooth headsets with strong noise reduction are recommended

解决bp中文乱码

一名外包仔的2022年中总结
![[fxcg] inflation differences will still lead to the differentiation of monetary policies in various countries](/img/56/386f0fd6553b8b9711e14c54705ae3.jpg)
[fxcg] inflation differences will still lead to the differentiation of monetary policies in various countries
![[Apple Push] IMessage group sending condition document (push certificate) development tool pushnotification](/img/30/c840e28c0ef7c8ce574dcde4363863.jpg)
[Apple Push] IMessage group sending condition document (push certificate) development tool pushnotification

Appium automated testing framework

Busycal latest Chinese version
随机推荐
[literature reading] sparse in deep learning: practicing and growth for effective information and training in NN
Application of I2C protocol of STM32F103 (read and write EEPROM)
中移物联网OneOS与OneNET入选《2021年物联网示范项目名单》
vulnhub HA: Natraj
Nat. Comm. | use tensor cell2cell to deconvolute cell communication with environmental awareness
Deep dive kotlin synergy (20): build flow
Basic MySQL operations
CVPR 2022 | Dalian Institute of technology proposes a self calibration lighting framework for low light level image enhancement of real scenes
使用BENCHMARKSQL工具对kingbaseES执行灌数据提示无法找到JDBC driver
"Designer universe" argument: Data Optimization in the design field is finally reflected in cost, safety and health | chinabrand.com org
Basic types of data in TS
Busycal latest Chinese version
"Final review" 16/32-bit microprocessor (8086) basic register
vulnhub HA: Natraj
多板块轮动策略编写技巧----策略编写学习教材
跨境电商多商户系统怎么选
eth入门之DAPP
Appium automated testing framework
[set theory] set concept and relationship (set family | set family examples | multiple sets)
[set theory] set identities (idempotent law | exchange law | combination law | distribution rate | De Morgan law | absorption rate | zero law | identity | exclusion law | contradiction law | complemen