当前位置:网站首页>Getting started with rce
Getting started with rce
2022-07-05 13:54:00 【Cwxh0125】
brief introduction
Command Injection, Command injection , It means to destroy the structure of command statement by submitting maliciously constructed parameters , So as to achieve the purpose of executing malicious commands .PHP The command injection exploit is PHP One of the common scripting vulnerabilities in applications .
When the application needs to call some external programs to process the content , It will use some functions to execute system commands . Such as PHP Medium system,exec,shell_exec etc. , When the user can control the parameters in the command execution function , Inject malicious system commands into normal commands , Cause command execution attacks . ------------ Training documents
Divided into remote command execution ping And remote code execution evel.
The reason for the vulnerability : There is no input processing at the input port .
Our common router 、 A firewall 、 Intrusion detection and other devices web On the management interface
Case study
With pikachu Two lanes of the shooting range RCE As an example
One .exec"ping"
Generally, users will be provided with a ping Operation of the web Interface , User from web Input target on the interface IP, After submission , The backstage will be right for IP Address once ping test , And return the test results . In fact, this is an interface , It allows attackers to inject operating system commands or code directly into the background server , To control the background system , This is it. RCE Loophole . The specific back-end code is as follows :
$result.=shell_exec('ping '.$ip);// Splice variables directly , I didn't deal with it
Try first ping Baidu
Try splicing at the back
Try to view the directory
Two .exec"evel"
Back end code :
if(@!eval($_POST['txt']))
Submit directly phpinfo();
边栏推荐
- Require, require in PHP_ once、include、include_ Detailed explanation of the efficiency of repeated introduction of once class library
- Datapipeline was selected into the 2022 digital intelligence atlas and database development report of China Academy of communications and communications
- Zhubo Huangyu: these spot gold investment skills are not really bad
- Mmseg - Mutli view time series data inspection and visualization
- redis6主从复制及集群
- 荐号 | 有趣的人都在看什么?
- The development of speech recognition app with uni app is simple and fast.
- Data Lake (VII): Iceberg concept and review what is a data Lake
- 链表(简单)
- 2022司钻(钻井)考试题库及模拟考试
猜你喜欢
What about data leakage? " Watson k'7 moves to eliminate security threats
Anchor navigation demo
Jetpack compose introduction to mastery
::ffff:192.168.31.101 是一个什么地址?
What happened to the communication industry in the first half of this year?
redis6事务和锁机制
jasypt配置文件加密|快速入门|实战
荐号 | 有趣的人都在看什么?
牛客网:拦截导弹
Summit review | baowanda - an integrated data security protection system driven by compliance and security
随机推荐
Internal JSON-RPC error. {"code":-32000, "message": "execution reverted"} solve the error
Ueditor + PHP enables Alibaba cloud OSS upload
Don't know these four caching modes, dare you say you understand caching?
The development of speech recognition app with uni app is simple and fast.
ETCD数据库源码分析——rawnode简单封装
Controller in laravel framework
Why do I support bat to dismantle "AI research institute"
2022 driller (drilling) examination question bank and simulation examination
内网穿透工具 netapp
[js] basic syntax - for loop
Self built shooting range 2022
Interviewer soul torture: why does the code specification require SQL statements not to have too many joins?
LeetCode_2(两数相加)
Pancake Bulldog robot V2 (code optimized)
常见问题之PHP——Fatal error: Allowed memory size of 314572800 bytes exhausted...
深拷贝真难
Kotlin collaboration uses coroutinecontext to implement the retry logic after a network request fails
How to apply the updated fluent 3.0 to applet development
Ordering system based on wechat applet
:: ffff:192.168.31.101 what address is it?