server-side

Compare original and translation side by side

🇺🇸

Original

English
🇨🇳

Translation

Chinese

Server-Side

服务端

Test for server-side vulnerabilities that allow unauthorized access, RCE, or data exfiltration.
测试可能导致未授权访问、RCE或数据泄露的服务端漏洞。

Techniques

测试技术

TypeKey Vectors
SSRFInternal service access, cloud metadata, protocol smuggling
HTTP SmugglingCL.TE, TE.CL, TE.TE, CL.0, H2.CL, h2c, multi-layer proxy chains, connection pooling desync
Path TraversalDirectory traversal, null bytes, encoding bypass
File UploadExtension bypass, content-type manipulation, polyglot files
DeserializationJava, PHP, Python, .NET gadget chains
Host HeaderPassword reset poisoning, cache poisoning, routing-based SSRF
CUPS / cups-browsedCVE-2024-47076/47175/47176/47177 — UDP browse → IPP injection → PPD injection → foomatic-rip RCE (
reference/cups-browsed-exploit.md
)
类型关键攻击向量
SSRF内部服务访问、云元数据、协议走私
HTTP请求走私CL.TE、TE.CL、TE.TE、CL.0、H2.CL、h2c、多层代理链、连接池不同步
路径遍历目录遍历、空字节、编码绕过
文件上传扩展名绕过、内容类型篡改、多语言文件
反序列化Java、PHP、Python、.NET gadget chains
Host Header密码重置投毒、缓存投毒、基于路由的SSRF
CUPS / cups-browsedCVE-2024-47076/47175/47176/47177 — UDP浏览 → IPP注入 → PPD注入 → foomatic-rip RCE (
reference/cups-browsed-exploit.md
)

Workflow

测试流程

  1. Identify server-side processing points
  2. Test for vulnerability class indicators
  3. Bypass protections (WAF, allowlists, encoding filters)
  4. Demonstrate impact (file read, RCE, internal access)
  5. Capture evidence with PoC
  1. 识别服务端处理节点
  2. 测试漏洞类别的特征
  3. 绕过防护机制(WAF、白名单、编码过滤器)
  4. 验证影响(文件读取、RCE、内部访问)
  5. 用PoC捕获证据

Reference

参考资料

  • reference/ssrf*.md
    - SSRF techniques and labs
  • reference/http-request-smuggling*.md
    - Smuggling techniques
  • reference/path-traversal*.md
    - Path traversal bypass methods
  • reference/file-upload*.md
    - File upload exploitation
  • reference/insecure-deserialization*.md
    - Deserialization attacks
  • reference/http-host-header*.md
    - Host header injection
  • reference/cups-browsed-exploit.md
    - CUPS RCE chain (CVE-2024-47076/175/176/177); ipptool false positives vs libcups runtime parser; ippserver Python lib version-1.1 hardcode bug
  • reference/ssrf*.md
    - SSRF技术与实验环境
  • reference/http-request-smuggling*.md
    - 请求走私技术
  • reference/path-traversal*.md
    - 路径遍历绕过方法
  • reference/file-upload*.md
    - 文件上传利用
  • reference/insecure-deserialization*.md
    - 不安全反序列化攻击
  • reference/http-host-header*.md
    - Host Header注入
  • reference/cups-browsed-exploit.md
    - CUPS远程代码执行链(CVE-2024-47076/175/176/177);ipptool误报与libcups运行时解析器对比;ippserver Python库版本1.1硬编码漏洞