Phpwind7.5 后台本地包含漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

文件:hack\rate\admin.php 源码: <?php !function_exists('readover') && exit('Forbidden'); define ( "H_R", R_P . "hack/rate/" ); define ( "L_R", R_P . "lib/" ); InitGP ( array ('ajax' ) ); $action = strtolower ( ($job) ? $job : "admin" ); $filepath = H_R . "action/" . $action . "Action.php"; (! file_exists ( $filepath )) && exit (); if ($job != "ajax") { require H_R . '/template/layout.php'; } else { require_once $filepath; } ?> 再看看hack\rate\template\layout.php: <?php !function_exists('readover') && exit('Forbidden'); include_once PrintEot ( 'left' ); print <<<EOT --> EOT; require_once $filepath; include_once PrintEot ( 'adminbottom' ); ?> $job可以自定义,触发本地包含,只不过addslashes了,因此不能通过%00截断;但可以通过若干///////截断,或者直接在tmp文件夹下写个shell来包含。 Phpwind7.5 临时补丁: $filepath = H_R . "action/" . $action . "Action.php"; 替换为: $filepath = Pcv(H_R . "action/" ....

0%
暂无可用Exp或PoC
当前有0条受影响产品信息