### 简要描述:
大汉网络JCMS Getshell,综合利用。
### 详细说明:
通过之前的任意文件下载等漏洞能够拿到管理员密码:
[<img src="https://images.seebug.org/upload/201405/3023212780eb03ee352f0c29959c94ec85809b8c.png" alt="0.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/3023212780eb03ee352f0c29959c94ec85809b8c.png)
登录初始化管理平台:
[<img src="https://images.seebug.org/upload/201405/3023232007acc381e99906c32a039d32a6975847.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/3023232007acc381e99906c32a039d32a6975847.png)
在上传许可的地方,只在本地做了后缀明判断:
[<img src="https://images.seebug.org/upload/201405/30232406d4a8a512911d6b037ae1a98c37da12af.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/30232406d4a8a512911d6b037ae1a98c37da12af.png)
绕过本地js后缀限制,上传shell:
[<img src="https://images.seebug.org/upload/201405/30232449c7ff346b86c892dec4ac60b9a870f7a3.png" alt="3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/30232449c7ff346b86c892dec4ac60b9a870f7a3.png)
### 漏洞证明:
opr_licenceinfo.jsp 代码分析:
```
//上传文件
if(strBillStatus.equals("U")){
//文件路径,上传目录为系统根目录
String strDictionary = application.getRealPath("") +"/";
java.io.File file = new java.io.File( strDictionary );
//准备上传
CommonUploadFile upload = null;
boolean bResult = false;
upload = new CommonUploadFile(strDictionary,"");
try{
//直接上传文件没有任何过滤
bResult = upload.uploadFile(request);
}catch(Exception e ){}
try{
if( bResult )strAlert += "alert('文件上传成功!');" ;
```
暂无评论