POC详情: a08f7050c08e7a87553ce782528943a5b6e25f43

来源
关联漏洞
标题: Joomla 安全漏洞 (CVE-2021-23132)
描述:Joomla是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。 Joomla Core 存在安全漏洞,目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。以下产品及版本受到影响:Joomla! 3.2.0 through 3.9.24.
描述
com_media allowed paths that are not intended for image uploads to RCE
介绍
# CVE-2021-23132
com_media allowed paths that are not intended for image uploads to RCE.

# CVE-2020-24597
Directory traversal in com_media to RCE

Two CVEs are the same.

PoC (Full)

Affected version: Joomla core <=3.9.24

User requirement: Admin account (Not Superadmin)

Gain access: Create superadmin, then trigger RCE.

Remote Code Execution (RCE) in Joomla

Run `cve-2021-23132.py` with your credentials and access link rce:

`http://target/templates/protostar/error.php?cmd=ls `

PoC:
 ```
 python3 cve-2021-23132.py -url http://192.168.72.140 -u admin -p 1234  -rce 1 -cmd ls
 ```

![image](https://user-images.githubusercontent.com/24661746/109748558-a898c200-7c0b-11eb-865f-ed903f23b4d9.png)

I wrote PoC to be able to use `Directory Traversal` or RCE mode.

I used `Directory Traversal` to trigger RCE.

You can use `python3 cve-2021-23132.py -h` to how to use PoC.

Note: Make sure you used python3 and install `lmxl` by `pip3 install lxml`

# DISCLAIMER

*Please use your research and help Joomla more secure.*

# References

https://developer.joomla.org/security-centre/846-20210306-core-com-media-allowed-paths-that-are-not-intended-for-image-uploads.html
文件快照

[4.0K] /data/pocs/a08f7050c08e7a87553ce782528943a5b6e25f43 ├── [ 18K] cve-2021-23132.py └── [1.1K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。