CVE漏洞复现

CVE-2021-44228 Log4j2远程代码执行漏洞

什么是Log4j?
Log for Java,Apache的开源日志记录组件,使用非常广泛
使用方法:
1、pom引入依赖
2、获得logger实例
3、通过这些方法查看日志信息logger.info() debug() error() warn() …
什么是LDAP?
LDAP是轻量级目录访问协议(目录服务)
image-20241126124855167
image-20241126124918887
image-20241126125244284
image-20241126125117846
image-20241126125440876
image-20241126172637735
image-20241126172730398
image-20241126173645718
image-20241126173950313
image-20241126201104950
image-20241126204407091
image-20241126204504664
image-20241126205035310
image-20241126205256501
image-20241126205340907
image-20241126205426719
image-20241126211749065
image-20241126224635462
image-20241126224738745
image-20241126225152411
image-20241126225216767
image-20241126225352353
image-20241126234839708

方法排查

Log4jRCE漏洞修复

CVE-2022-22947-SpringCloudGatewayRCE(SpEL表达式)

image-20241127005400139
image-20241127131133341
image-20241127131236791
image-20241127131329882
image-20241127131433870
image-20241127131531500

漏洞复现

image-20241127134159548
image-20241127134326802
image-20241127135008247

原理分析

image-20241127143132764
image-20241127143602246
image-20241127143857377

扫描与修复

image-20241127144146778
image-20241127144228101

CVE-2022-22965-springrce

Spring动态参数绑定

image-20241127171437337
image-20241127171517669
image-20241127171749106
image-20241127171940472
image-20241127182457603
image-20241127182734545
image-20241127182930188
image-20241127183413284
image-20241127183643393
image-20241127183836933
image-20241127184116366

漏洞复现

image-20241127184330957
image-20241127192337679
image-20241127192451860
image-20241127192557360
image-20241127192718281
image-20241127200657853
image-20241127200804378
image-20241127200831786
image-20241127200858472

原理分析

image-20241127193152655

漏洞排查与修复

CVE-2021-31805-struts2s2-062 ONGL远程代码执行

前置知识分析

image-20241127231553869
image-20241127232049181
image-20241127232201016
image-20241127232256606
image-20241127233353493

复现漏洞

image-20241127233627313
image-20241127233814575
image-20241127234201467
image-20241127235523346
image-20241127235554354
image-20241127235843802

原理分析

image-20241128000944489

检测和修复

CVE-2019-5736Docker逃逸

前置知识

image-20241129150837119
image-20241129150941069
image-20241129151013302
image-20241129151103175
image-20241129151205840
image-20241129151335029
image-20241129151416978
image-20241129151427537

漏洞复现

image-20241129162637509
image-20241129162412833
image-20241129163054795
image-20241129175504713
image-20241129164042602
image-20241129164127721
image-20241129164347717
image-20241129164955914
image-20241129165756169
image-20241129170019807
image-20241129170255018
image-20241129170406951
image-20241129170645276
image-20241129170739901
image-20241129170927363
image-20241129171424692

docker安全加固

CVE-2023-32233NetFilter权限提升

漏洞复现

image-20241129205559739
image-20241129205126698
image-20241129205152463

漏洞修复

CVE-2023-38831WinRAR代码执行漏洞

漏洞复现

image-20241130010518493
image-20241130010745169
image-20241130012332900
image-20241130012345333
image-20241130011310955
image-20241130011343917

漏洞原理

image-20241130012415457

Last updated