Ewebeditor background passthrough Vulnerability

Source: Internet
Author: User

Lost.cq.cn

I checked the php version of ewebeditor today. I remember that I used to read the php version. The version was relatively low and I didn't even connect to the backend.
Today, I made a 3.8 shopping spree and found something exciting...
In the php version, the backend is to call ../ewebeditor/admin/config. php. You can see the source code.
Method of exploits: first of all, you must find the login background. The default value is ../eWebEditor/admin/login. php. Enter a user and password after entering the background. Of course, an error will be prompted.
In this case, clear the url of the browser and enter javascript: alert (document. cookie = "adminuser =" + escape ("admin"); javascript: alert (document. cookie = "adminpass =" + escape ("admin"); javascript: alert (document. cookie = "admindj =" + escape ("1"); press enter three times to clear the url of the browser. Please note that you should note the entered url this time, the files we need to input this time are all files that can be browsed normally after verification, such .. /ewebeditor/admin/default. php
Haha, just go in. Just like asp, you can add a new style and modify the upload.
Test the asp 2.8 version. It seems that the asp version can be used in the same way. It seems that the asp version can be used only to test the 2.8 version. It seems that the 2.8 version is the highest version)
The aspx version ../ewebeditor/admin/upload. aspx adds the Shell file of the local cer, and enters javascript: lbtnUpload. click () in the receiver to get the shell.
Jsp upload vulnerability and the one that has been running for N long. Because there is no upload button, select the shell to be uploaded and press Enter.
Haha, in the future, if the background of the ewebeditor can be found, you can kill it.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.