### 简要描述:
用友某管理系统弱口令已GetShell
### 详细说明:
```
http://vip.ufida.com.cn/nccsm/Admin.aspx
```
admin sqbbagdp
进入后台发现有个编辑器 然后getshell
[<img src="https://images.seebug.org/upload/201508/101127043a958b2473fca023f9d17ae6bf64b105.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/101127043a958b2473fca023f9d17ae6bf64b105.jpg)
里面的数据太多了
[<img src="https://images.seebug.org/upload/201508/1011271812f074fcc377a676de4be4f3c69c84ee.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/1011271812f074fcc377a676de4be4f3c69c84ee.jpg)
### 漏洞证明:
admin sqbbagdp
进入后台发现有个编辑器 然后getshell
[<img src="https://images.seebug.org/upload/201508/101127043a958b2473fca023f9d17ae6bf64b105.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/101127043a958b2473fca023f9d17ae6bf64b105.jpg)
里面的数据太多了
[<img src="https://images.seebug.org/upload/201508/1011271812f074fcc377a676de4be4f3c69c84ee.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201508/1011271812f074fcc377a676de4be4f3c69c84ee.jpg)
暂无评论