Discuz利用UC_KEY进行前台getshell2

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 简要描述: http://drops.wooyun.org/papers/7830 其实这里已经说得比较明白了。 利用这个漏洞已经好些时候,包括之前腾讯的shell(http://www.wooyun.org/bugs/wooyun-2010-092923) 不过好像官方还是不太重视,特意再提一下,不用登陆后台,直接前台能利用(顺便打卡^-^) 乌云搜索uc_key会有很多惊喜哦。 ### 详细说明: \api\uc.php ``` function updatebadwords($get, $post) { global $_G; if(!API_UPDATEBADWORDS) { return API_RETURN_FORBIDDEN; } $data = array(); if(is_array($post)) { foreach($post as $k => $v) { $data['findpattern'][$k] = $v['findpattern']; $data['replace'][$k] = $v['replacement']; } } $cachefile = DISCUZ_ROOT.'./uc_client/data/cache/badwords.php'; $fp = fopen($cachefile, 'w'); $s = "<?php\r\n"; $s .= '$_CACHE[\'badwords\'] = '.var_export($data, TRUE).";\r\n"; fwrite($fp, $s); fclose($fp); return API_RETURN_SUCCEED; } ``` 更新 uc_client/data/cache/badwords.php 再看 \source\module\forum\forum_ajax.php ``` if($_GET['action'] == 'checkusername') { $username = trim($_GET['username']); $usernamelen = dstrlen($username); if($usernamelen < 3) { showmessage('profile_username_tooshort', '',...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息