关联漏洞
标题:
Pluck 安全漏洞
(CVE-2023-50564)
描述:Pluck是一套使用PHP语言开发的内容管理系统(CMS)。 Pluck v4.7.18版本存在安全漏洞,该漏洞源于组件 /inc/modules_install.php 中存在任意文件上传漏洞,允许攻击者通过上传精心设计的 ZIP 文件来执行任意代码。
介绍
## CVE-2023-50564 (PoC)
This repository contains a Proof of Concept for CVE-2023-50564 vulnerability in Pluck CMS version 4.7.18

## Description
CVE-2023-50564 is a vulnerability that allows unauthorized file uploads in Pluck CMS version 4.7.18. This exploit leverages a flaw in the module installation function to upload a ZIP file containing a PHP shell, thereby enabling remote command execution.
## Usage
### Prerequisites
- Python 3.x
- The `requests` and `requests_toolbelt` packages
You can install the necessary packages with the following command:
```bash
pip install requests requests_toolbelt
```
## Instructions
1. Clone this repository:
```bash
git clone https://github.com/Rai2en/CVE-2023-50564_Pluck-v4.7.18_PoC.git
cd CVE-2023-50564_Pluck-v4.7.18_PoC
```
2. Replace <hostname> with the target domain name or IP address in the PoC script.
3. Create a `payload.zip` file containing `shell.php`. I recommand [pentestmonkey](https://github.com/pentestmonkey/php-reverse-shell) PHP reverse shell and replace `<your_ip>` and `<port>` fields with your IP and listening port.
4. Run the PoC script:
```bash
python exploit.py
```
You will be prompted to enter the path to the ZIP file:
```bash
ZIP file path: ./path/to/payload.zip
```
## Output example
- If the login and upload are successful:
```bash
Login successful
ZIP file upload successfuly.
<output of the executed shell.php>
```
- If a login error occurs:
```bash
Login problem. response code: <code>
```
- If an upload error occurs:
```bash
ZIP file upload error. Response code: <code>
```
## Note
Ensure that the `shell.php` file contains the correct reverse shell and your listener is waiting for the connection on the specified port.
文件快照
[4.0K] /data/pocs/223e107377e6c9661349e0eede9fae5fa070f6ac
├── [1.0K] LICENSE
├── [1.6K] poc.py
├── [1.8K] README.md
└── [2.6K] shell.rar
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。