Qibo enterprise website management system injects 0day & amp; GetShell

Source: Internet
Author: User

Qibo enterprise website management system is a common enterprise website management system. Many enterprise websites on the market use its source code. Its ASPX version is encapsulated, that is, many things are put into the DLL, which makes it difficult to view the source code. The version of the vulnerability is version 2011. There are a lot of online vulnerabilities. In fact, the focus is on GetShell, which is very skillful. Vulnerability name: qibo enterprise website management system SQL injection test version: qibo Enterprise Website Management System Single-Language Standard Edition V2011 Build0608 vulnerability details: because the search area does not filter the input, resulting in SQL injection. The vulnerability file name is Search. Aspx. Vulnerability verification: Access http://localhost/Search.Aspx?sid=2&keyword=% 'And' % Jarett % '=' % Jarett, return all content access http://www.bkjia.com /Search. Aspx? Sid = 2 & keyword = % 'and' % Jarett % '=' % sb. If the returned result is null, the injection exists, but it may not be able to be directly union. Half-lookup is required, click it manually. In a short time, you will be confused. After obtaining the password, you can add an admin directory directly to the background. If there are no exceptions, and you enter the background, you cannot get the shell, however, a skillful GetShell method was found during a local test. This system uses eWebEditor, but it cannot be used directly. It has been processed by the second DLL encapsulation. Direct access: http://localhost/admin/ Editor/aspx/style. aspx cannot be accessed. It will take you to the homepage. To use this page, there are two conditions: 1. the identity is administrator and you have logged on. 2. The source of the access address is the background address, that is, the request must contain a refer: http://localhost/admin/ Now we have the first condition. You only need to use Firefox plug-ins or other plug-ins to forge a refer header and then directly enter the style management interface: http://localhost/admin/ Editor/aspx/style. aspx the rest of the elevation of privilege should be done by everyone. The reason is that the elevation of permission is really special. If it is not a local test, I believe that not many people will try to add a refer header. It's also a wonderful GetShell.

Www.2cto.com provides repair measures:
Enhanced Filtering

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.