2019-07-25 10:17:46 +08:00

84 lines
1.6 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

dz-ml-rce.py discuz ml RCE 漏洞检测工具
==
----------------
# 概述
<br/>
漏洞在于cookie的language可控并且没有严格过滤导致可以远程代码执行详情参考
[discuz ml RCE漏洞重现及分析](http://www.lsablog.com/networksec/penetration/discuz-ml-rce-analysis/)
<br/>
本工具支持单url和批量检测有判断模式只判断有无该漏洞、cmdshell模式返回简单的cmd shell和getshell模式写入一句话木马
----------------
# 需求
<br/>
python2.7<br/>
pip -r requirements.txt
<br/><br/>
**使用时加上漏洞PHP页面如forum.php,portal.php直接写域名可能会重定向导致误报!**
----------------
# 快速开始
<br/>
使用帮助<br/>
python dz-ml-rce.py -h<br/>
![](demo/dzmlrce06.png)
<br/>
判断模式<br/>
python dz-ml-rce.py -u "http://www.xxx.cn/forum.php" <br/>
![](demo/dzmlrce02.png)
<br/>
cmdshell模式<br/>
python dz-ml-rce.py -u "http://www.xxx.cn/forum.php" --cmdshell<br/>
![](demo/dzmlrce03.png)
<br/>
getshell模式<br/>
python dz-ml-rce.py -u "http://www.xxx.cn/forum.php" --getshell<br/>
![](demo/dzmlrce04.png)
<br/>
批量检测<br/>
python dz-ml-rce.py -f urls.txt<br/>
![](demo/dzmlrce01.png)
<br/>
批量getshell<br/>
python dz-ml-rce.py -f urls.txt --getshell<br/>
![](demo/dzmlrce09.png)
----------------
# TODO
有空会做各种优化。
----------------
# 反馈
[issus](https://github.com/theLSA/discuz-ml-rce/issues)
<br/>
博客http://www.lsablog.com/networksec/penetration/discuz-ml-rce-analysis/
<br/>
gmaillsasguge196@gmail.com
<br/>
qq2894400469@qq.com