### 简要描述:
大汉网络无条件GetShell漏洞
### 详细说明:
漏洞地址:
/vc/vc/index/que_index.jsp
过程演示:
[<img src="https://images.seebug.org/upload/201501/1700074655fdbc30ad20773321a6bd154be57860.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/1700074655fdbc30ad20773321a6bd154be57860.png)
根据提示构造zip包
[<img src="https://images.seebug.org/upload/201501/1700081493327486c14701ea174a758556f24f94.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/1700081493327486c14701ea174a758556f24f94.png)
default.html 页面填写相应内容。
[<img src="https://images.seebug.org/upload/201501/17000841d66ae96b408f4d457c19eacf7e520f89.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/17000841d66ae96b408f4d457c19eacf7e520f89.png)
上传zip包,上传成功。
[<img src="https://images.seebug.org/upload/201501/17000906cbe43a58f84343a1661c208ac81b2bc4.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/17000906cbe43a58f84343a1661c208ac81b2bc4.png)
成功上传WebShell,
访问地址:http://www.njhdgcj.com/vc/vc/htmlhttps://images.seebug.org/upload/j.jsp
[<img src="https://images.seebug.org/upload/201501/1700093038b1722c24ae79bbe20c22866587ffb5.png" alt="clipboard.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201501/1700093038b1722c24ae79bbe20c22866587ffb5.png)
### 漏洞证明:
案例:
长江南京航道工程局
http://www.njhdgcj.com/vc/vc/index/que_index.jsp
浙江审计厅
http://122.224.88.252/vc/vc/index/que_index.jsp
启动政府
http://www.qidong.gov.cn//vc/vc/index/que_index.jsp
中共江苏省委党校
http://www.sdx.js.cn/vc/vc/index/que_index.jsp
济南天桥
http://www.tianqiao.gov.cn/vc/vc/index/que_index.jsp
暂无评论