Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

【SRC漏洞挖掘】- DOS类漏洞 #63

Open
AI0TSec opened this issue Feb 14, 2025 · 0 comments
Open

【SRC漏洞挖掘】- DOS类漏洞 #63

AI0TSec opened this issue Feb 14, 2025 · 0 comments

Comments

@AI0TSec
Copy link
Owner

AI0TSec commented Feb 14, 2025

一、REPT DOS

表格函数:=REPT(“字符”,数量)

漏洞危害
1、服务器直接DOS(高危、严重);
2、功能点重放包DOS(功能点重要程度决定)
3、客户端DOS(中危、低危)

漏洞点:在线文档、在线扫描表格、在线格式转换、表格导入等

漏洞证明:两台在不同网络环境中的设备相互验证(一台充当正常用户、一台充当攻击者,正常用户查看某功能点是否正常运行)、响应时间观察、多表格测试“REPT”函数(观察在哪个表格无法解析函数)

二、ZIP炸弹DOS

参考:https://blog.csdn.net/u013469753/article/details/119342235

漏洞点:在线解压

漏洞危害:低危

检测方式:少量多次上传(zbsm.zip),通过另一网络的正常用户观察功能响应时间及功能是否正常

Image

三、XEE、XXE解析利用

理解XEE:

新建"DOS测试.docx“文件
Image
新增内容:"TESTTEST",并保存
Image
修改"DOS测试.docx“文件后缀名为“.zip”,解压
Image
文本内容在"..\DOS测试\word\document.xml"文件,“<w:t></w:t>”标签内
Image

基于该机制,可以构造实体变量
<!DOCTYPE w:t [<!ENTITY External "External">]>
引用实体变量:&实体名;
Image
重新打包为.zip格式,后修改后缀名为.docx

暂未完成

@AI0TSec AI0TSec changed the title 【SRC漏洞挖挖掘】- DOS类漏洞 【SRC漏洞挖掘】- DOS类漏洞 Feb 14, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant