前台上传漏洞
实验环境:phpstudy win7 CSDJCMS V 3.0版本
条件:member会员,IIS服务
漏洞位置:C:\phpStudy\WWW\CSDjcms\public\scripts,下的uploadify.php文件

进行构造表单


首先cookie值里要伪造该参数,结合前两节,进行burpsuite改包即可
先进行上传正常的页面

对应产生新的文件夹

想利用IIS的目录解析漏洞,那么上传的格式得是 xx.asp/xxxx/xxxxx.mp3
找找可控的参数

Request接收的参数,也没有进行验证,修改form表单


但是并没有新建asp的目录
检查,输出完整路径


调整

再次测试


再次查看完整路径,可利用IIS目录解析漏洞,
C:\phpStudy\WWW\CSDjcms\1.asp\201802\20180208130532_93567.mp3
可进行访问触发漏洞
网友评论