当前位置:网站首页>[Vulnerability reproduction] CVE-2018-7490 (path traversal)
[Vulnerability reproduction] CVE-2018-7490 (path traversal)
2022-08-09 08:40:00 【z.volcano】
Affected Versions
Previous to uWSGI 2.0.17
Environment
https://github.com/vulhub/vulhub/blob/master/uwsgi/CVE-2018-7490
Or directly use the environment in BUUOJ
Vulnerability Analysis
uWSGI PHP Plugin < 2.0.17
does not properly handle the --php-docroot
option detected by DOCUMENT_ROOT
, allowing attackers to passA specially crafted URL request with a '...' sequence to maliciously view arbitrary files on the system.
Get started
Open buuoj's drone and see
Don't use the payload in the exp first, try to see if ../../../
can perform directory traversal, you can find that the page and url have not changed, indicating that it is filtered
So urlencode ../
once,Get the ..%2f
in the payload and upload the payload directly
Successfully read /etc/passwd file
边栏推荐
猜你喜欢
随机推荐
mysql-5.5.40的完全卸载
App testing
Object detection app based on appinventor and EasyDL object detection API
火星人 --简单的数学题
requests之数据解析Xpath介绍
Redis redis 】 【 the expiration of listening
Buns make up the number----Euclide+dp
MySQL数据库
Operator Overloading in Inheritance: A Legend of Input and Output
XCTF高校战“疫”网络安全分享赛Misc wp
web基本概念
数制之间的转换
Introduction to Network Layer Protocols
897. 增加订单搜索树
[漏洞复现]CVE-2018-7490(路径遍历)
Boot process and service control
路由配置转发及实验
数据库MySQL的安装和卸载
OpenHarmony轻智能产品开发直播笔记
三次握手,四次挥手