Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-7600 PoC — Drupal 安全漏洞

Source
Associated Vulnerability
Title:Drupal 安全漏洞 (CVE-2018-7600)
Description:Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.
Description
CVE-2018-7600 漏洞验证和利用
Readme
# CVE-2018-7600
CVE-2018-7600 漏洞验证和利用 Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution
```
PS D:\CVE-2018-7600> python .\PoC.py
Input target URL (example: http://example.com/): http://192.168.4.5:8080/

Exploitable!
Check: http://192.168.4.5:8080/hh.txt
```
```
PS D:\CVE-2018-7600> python .\Exp.py
Input target URL (example: http://example.com/): http://192.168.4.5:8080/

The attack was successful!
Check backdoor: http://192.168.4.5:8080/hh.php
Backdoor key: c
```
exp利用成功后,会生成后门文件hh.php,可利用WebShell管理工具(如:蚁剑)进行后门连接,类型为php,密码是c
File Snapshot

[4.0K] /data/pocs/0104e81e1dc1c7027891b1269c6a6905fafe0114 ├── [1.2K] Exp.py ├── [ 784] PoC.py └── [ 651] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →