Skip to content
Typecho deserialization vulnerability exploit.
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.gitattributes
.gitignore
README.md
b374k.php
backdoor.log
exp.py

README.md

Typecho_deserialization_exploit

Description

Typecho deserialization vulnerability in Oct 2017.

This scripts is for learning purpose ONLY. DO NOT use on unauthorized circumstances. USE AT YOUR OWN RISK!!!

Environment

pip install requests

Python 2/3, then you are all set!

Build your own exe

If you want to build exe on your own, install pyinstaller and run pyinstaller -F exp.py.

How to patch Typecho and some further suggestions##

  • Upgrade Typecho to the latest version
  • Delete install.php and install directory once the installation completes.
  • Assign www and mysql nologin shell account for Apache/Nginx, PHP and MySQL.
  • Update your system regularly, DO NOT use EOL Operating System.
  • It's better to use Linux for webserver rather than Windows.
  • set open_basedir in php.ini

References and Credits

ph0rse

joyqi

blogsir

b374k

You can’t perform that action at this time.