<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>漏洞检测，网络安全，SmarterMail，Nuclei on 办公AI智能小助手</title>
    <link>https://blog.qife122.com/tags/%E6%BC%8F%E6%B4%9E%E6%A3%80%E6%B5%8B%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8smartermailnuclei/</link>
    <description>Recent content in 漏洞检测，网络安全，SmarterMail，Nuclei on 办公AI智能小助手</description>
    <generator>Hugo</generator>
    <language>zh-cn</language>
    <copyright>qife</copyright>
    <lastBuildDate>Sat, 10 Jan 2026 15:28:43 +0800</lastBuildDate>
    <atom:link href="https://blog.qife122.com/tags/%E6%BC%8F%E6%B4%9E%E6%A3%80%E6%B5%8B%E7%BD%91%E7%BB%9C%E5%AE%89%E5%85%A8smartermailnuclei/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>CVE-2025-52691漏洞检测技术详解</title>
      <link>https://blog.qife122.com/p/cve-2025-52691%E6%BC%8F%E6%B4%9E%E6%A3%80%E6%B5%8B%E6%8A%80%E6%9C%AF%E8%AF%A6%E8%A7%A3/</link>
      <pubDate>Sat, 10 Jan 2026 15:28:43 +0800</pubDate>
      <guid>https://blog.qife122.com/p/cve-2025-52691%E6%BC%8F%E6%B4%9E%E6%A3%80%E6%B5%8B%E6%8A%80%E6%9C%AF%E8%AF%A6%E8%A7%A3/</guid>
      <description>&lt;h1 id=&#34;detection-for-cve-2025-52691&#34;&gt;Detection for CVE-2025-52691&lt;/h1&gt;&#xA;&lt;p&gt;SmarterMail Build 9406 and earlier is vulnerable to arbitrary file upload. An unauthenticated attacker can upload arbitrary files to any location on the mail server, potentially enabling remote code execution.&lt;/p&gt;&#xA;&lt;h2 id=&#34;how-does-this-detection-method-work&#34;&gt;How does this detection method work?&lt;/h2&gt;&#xA;&lt;p&gt;Sends a GET request to &lt;code&gt;/interface/root#/login&lt;/code&gt;, confirms SmarterMail is present via the &lt;code&gt;ng-app=&amp;quot;smartermail&amp;quot;&lt;/code&gt; directive, extracts the version and build number from the &lt;code&gt;stProductVersion&lt;/code&gt; JavaScript variable, and flags instances as vulnerable if the build number is less than or equal to 9406 as per csa.gov.sg&amp;rsquo;s alert:&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
