### 简要描述:
### 详细说明:
#1.看看前人提交的漏洞: [WooYun: 某通用型电子采购平台SQL注射(涉及大量企业)](http://www.wooyun.org/bugs/wooyun-2014-062918) ,说的是注入漏洞,后来仔细研究发现存在一个编辑器存在任意文件上传可导致批量Getshell,影响危害极大。
厂商:
```
http://www.***ng.com/ 北京网达信联科技发展有限公司
```
关键字(构造的不是很好):
[<img src="https://images.seebug.org/upload/201407/291204052cf36849f43475dc099d60c564a719f0.jpg" alt="01.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/291204052cf36849f43475dc099d60c564a719f0.jpg)
#2.Getshell漏洞。
```
/ftb.im***y.aspx 可以直接上传asp文件
```
[<img src="https://images.seebug.org/upload/201410/211546407a64b18dda02c620aaaab66e1ac70376.jpg" alt="291210348ece30c751e1b22c9c6ce05bf50437b8.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201410/211546407a64b18dda02c620aaaab66e1ac70376.jpg)
### 漏洞证明:
【声明以下案例仅供CNCERT、CNVD复现测,其它人不得利用或使用其恶意破坏,否则后果自负!】
#3.案例测试:
```
http://eps.***t.com/ftb.imagegallery.aspx
```
[<img src="https://images.seebug.org/upload/201407/29164505dc8d02079c731b2aadb60d3dae859620.jpg" alt="01.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/29164505dc8d02079c731b2aadb60d3dae859620.jpg)
[<img src="https://images.seebug.org/upload/201407/2916470347d6314d0df982a83efd5115bb008726.jpg" alt="02.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/2916470347d6314d0df982a83efd5115bb008726.jpg)
```
http://eps.l***n.com:8008/ftb.imagegallery.aspx
```
[<img src="https://images.seebug.org/upload/201407/2916511368e6cfef1e3103afcd21fea162b7e93f.jpg" alt="04.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/2916511368e6cfef1e3103afcd21fea162b7e93f.jpg)
```
http://ebid.r***.com.cn:88/ftb.imagegallery.aspx
```
[<img src="https://images.seebug.org/upload/201407/29164936453d2065531b93383ad3e4bff059b9ea.jpg" alt="03.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/29164936453d2065531b93383ad3e4bff059b9ea.jpg)
```
http://eps.h***.com/ftb.imagegallery.aspx
```
[<img src="https://images.seebug.org/upload/201407/291653534c1f460b6b345319032964416611e83a.jpg" alt="05.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/291653534c1f460b6b345319032964416611e83a.jpg)
```
http://www.bi***ro.com/ftb.imagegallery.aspx
```
[<img src="https://images.seebug.org/upload/201407/291655186c92ae2ae1640f6fe650ddbb2e28d0c6.jpg" alt="06.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201407/291655186c92ae2ae1640f6fe650ddbb2e28d0c6.jpg)
暂无评论