A weak password \ SQL injection vulnerability in a website in Digital China Getshell
RT: Just stroll around to see if there are any vulnerabilities.
Vulnerability URL: http://dckf.digitalchina.com
First of all, I saw a great God used truncation to get the shell ....
Weak Password: Cheng Yan/123456789
Note: This is a weak password. The Administrator modified the policy last time. You cannot use a weak password to log on directly. You need to modify the information.
If I have modified it at the beginning and finished the test, I have changed it again .. The verification mechanism is poor ..
You can directly modify the email address and password. I will not attach the logon. Log on to
Under login: http://dckf.digitalchina.com/index.php/qa/qainput? Isetup-to-date = 1 & id = 374
The parameter id is injected ..
Test permission: root permission. Use sqlmap -- OS-shell to directly Getshell. (PS: Getshell was originally used, but failed. Haha ~~~~~~)
Is to use sqlmap to obtain a script for uploading arbitrary files... Getshell>.
Http://dckf.digitalchina.com/uploads/shangchuan.php ceshi123654
Troubleshoot the problem .... Try another test ..
Solution:
You know ..