### 简要描述: 大汉网络JCMS Getshell,综合利用。 ### 详细说明: 通过之前的任意文件下载等漏洞能够拿到管理员密码: [<img src="https://images.seebug.org/upload/201405/3023212780eb03ee352f0c29959c94ec85809b8c.png" alt="0.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/3023212780eb03ee352f0c29959c94ec85809b8c.png) 登录初始化管理平台: [<img src="https://images.seebug.org/upload/201405/3023232007acc381e99906c32a039d32a6975847.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/3023232007acc381e99906c32a039d32a6975847.png) 在上传许可的地方,只在本地做了后缀明判断: [<img src="https://images.seebug.org/upload/201405/30232406d4a8a512911d6b037ae1a98c37da12af.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/30232406d4a8a512911d6b037ae1a98c37da12af.png) 绕过本地js后缀限制,上传shell: [<img src="https://images.seebug.org/upload/201405/30232449c7ff346b86c892dec4ac60b9a870f7a3.png" alt="3.png" width="600"...
### 简要描述: 大汉网络JCMS Getshell,综合利用。 ### 详细说明: 通过之前的任意文件下载等漏洞能够拿到管理员密码: [<img src="https://images.seebug.org/upload/201405/3023212780eb03ee352f0c29959c94ec85809b8c.png" alt="0.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/3023212780eb03ee352f0c29959c94ec85809b8c.png) 登录初始化管理平台: [<img src="https://images.seebug.org/upload/201405/3023232007acc381e99906c32a039d32a6975847.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/3023232007acc381e99906c32a039d32a6975847.png) 在上传许可的地方,只在本地做了后缀明判断: [<img src="https://images.seebug.org/upload/201405/30232406d4a8a512911d6b037ae1a98c37da12af.png" alt="2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/30232406d4a8a512911d6b037ae1a98c37da12af.png) 绕过本地js后缀限制,上传shell: [<img src="https://images.seebug.org/upload/201405/30232449c7ff346b86c892dec4ac60b9a870f7a3.png" alt="3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201405/30232449c7ff346b86c892dec4ac60b9a870f7a3.png) ### 漏洞证明: opr_licenceinfo.jsp 代码分析: ``` //上传文件 if(strBillStatus.equals("U")){ //文件路径,上传目录为系统根目录 String strDictionary = application.getRealPath("") +"/"; java.io.File file = new java.io.File( strDictionary ); //准备上传 CommonUploadFile upload = null; boolean bResult = false; upload = new CommonUploadFile(strDictionary,""); try{ //直接上传文件没有任何过滤 bResult = upload.uploadFile(request); }catch(Exception e ){} try{ if( bResult )strAlert += "alert('文件上传成功!');" ; ```