### 简要描述:
RT,打了最新补丁
### 详细说明:
存在两个问题,最新版未修补:
1.后台可被爆破,导致暴力注入;(很多SQL注入点最终是为了进后台,那么这里直接暴力点)
2.模板编辑下可得shell。
### 漏洞证明:
暴力注入:
1.在后台登录页,点击登录后抓包:
[<img src="https://images.seebug.org/upload/201407/07145507ad25820ce60bee57b351a91da4aa2419.jpg" alt="e1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/07145507ad25820ce60bee57b351a91da4aa2419.jpg)
2.设置爆破字段为password:
[<img src="https://images.seebug.org/upload/201407/07145805b51761e4b7569486e1027478af616d93.jpg" alt="e2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/07145805b51761e4b7569486e1027478af616d93.jpg)
3.不要看burp返回,直接再次刷新页面,登录成功!
[<img src="https://images.seebug.org/upload/201407/07145915dd9a911b574e98346e9ef7f960096ffd.jpg" alt="e3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/07145915dd9a911b574e98346e9ef7f960096ffd.jpg)
拿shell的方法:
1.看下图,点击编辑(这一列的都可以编辑):
[<img src="https://images.seebug.org/upload/201407/07150109c50606a47d7c28db2cd209a112a02ba2.jpg" alt="ec1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/07150109c50606a47d7c28db2cd209a112a02ba2.jpg)
2.写入shell:
[<img src="https://images.seebug.org/upload/201407/07150153231aa7d0f469ff16d5313b138fbf112b.jpg" alt="ec2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/07150153231aa7d0f469ff16d5313b138fbf112b.jpg)
3.访问这个地址:
http://localhost/ecmalhttps://images.seebug.org/upload/external/widgets/advt/main.widget.php
[<img src="https://images.seebug.org/upload/201407/07150350b4abb4292498e7c52a50598899c64b66.jpg" alt="e5.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/07150350b4abb4292498e7c52a50598899c64b66.jpg)
暂无评论