1. Origin: Based on the WCM6 of TRS, the Administrator Password Vulnerability can be directly obtained. 2. First, access the wcm directory and the logon page is automatically displayed: 3. Add the following link to view the administrator password: wcm/infoview. do? Serviceid = wcm6_user & MethodName = getUsersByNames & UserNames = admin * the previous vulnerability indicates that viewing administrator information is not harmful because MD5 encryption is only half-captured, in addition, even if the password is cracked, the admin account may not be enabled (later ). 4. Click the back button of the browser or enter wcm/app/login. jsp directly after the URL in the address bar to bypass the permission to log on:
What is the identity of this system? See: The original account is retained by the system, and the permissions are relatively large. The attached admin account is not activated:
FinishedSolution:
Wait for official repair and strictly control Access Permissions