The cloud smoke substation has the excessive permission vulnerability. getshell + consumer information can be leaked.
An address in the background does not verify the identity of the visitor.
Yundun has been sold in supermarkets in various regions. The company is quite big. This substation privilege escalation vulnerability does not affect the main site. But it is in the same network segment as the master. You know
In my opinion, yundun is specialized in yundun. Although only 10 yuan a pack, I have a special liking for it.
Unauthorized http://yzd.hyhhgroup.com/admin/menu.php address.
The "prize inventory" section in the background does not verify the identity of the visitor. You can directly view the content:
Click Edit. You can see an error is reported when a parameter is directly added to the URL.
After bypassing login verification, there is SQL injection in the background, injection address: http://yzd.hyhhgroup.com/guangdong/sys/giftstoremodi.php? Id = 3
Solution:
In the words of white hats, it is to add identity login verification to the module URL in the background.