Update README.md

更新了飞书捷径配置
This commit is contained in:
sodme 2021-10-07 23:15:36 +08:00 committed by GitHub
parent 271d31dbfe
commit 22f6edfdc3
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -8,12 +8,22 @@
![image](https://user-images.githubusercontent.com/29257678/136410980-302be028-3817-447c-9bad-e3d63045060d.png)
![image](https://user-images.githubusercontent.com/29257678/136411130-217a2ae4-c422-48a4-8866-944176120087.png)
> 配置和测试效果
注意参数这里:
![image](https://user-images.githubusercontent.com/29257678/136413189-f393dfa2-4874-4fea-b8be-7b5892d65fcf.png)
添加下列json信息
```php
{"at":{},"msgtype":"text","text":{"content":"有新的CVE送达\r\nCVE编号CVE-2021-41773\r\nGithub地址https://github.com/iilegacyyii/PoC-CVE-2021-41773\r\nCVE描述\r\n在Apache HTTP Server 2.4.49的路径规范化更改中发现了一个缺陷。攻击者可以使用路径遍历攻击将url映射到预期文档根之外的文件。如果文档根目录之外的文件没有被“require all denied”保护这些请求就可以成功。此外这个缺陷可能会泄露解释文件(如CGI脚本)的源代码。众所周知这个问题是在野外被利用的。此问题仅影响Apache 2.4.49不影响Apache 2.4.49之前的版本。"}}
```
![image](https://user-images.githubusercontent.com/29257678/136411286-99c2e4db-0d8a-4b61-8613-96e3ebad8e44.png)
![image](https://user-images.githubusercontent.com/29257678/136411333-0f233245-5c4e-40f4-8a59-e0baef6f1d2b.png)
> 选择json里面的模块
![image](https://user-images.githubusercontent.com/29257678/136413413-48417c13-285d-47ff-9fba-c78bed592430.png)
> 查看效果
![image](https://user-images.githubusercontent.com/29257678/136413553-48c2100b-8f2d-4f81-8b8b-74351bde0456.png)
[修复钉钉通知小bug](https://github.com/yhy0/github-cve-monitor/issues/4)修复cve编号推送错误