TRS WCM6 vulnerability Permission Bypass and password bypass login Method

Source: Internet
Author: User
Tags md5 encryption

1. Origin: Based on the WCM6 of TRS, the Administrator Password Vulnerability can be directly obtained. 2. First, access the wcm directory and the logon page is automatically displayed: 3. Add the following link to view the administrator password: wcm/infoview. do? Serviceid = wcm6_user & MethodName = getUsersByNames & UserNames = admin * the previous vulnerability indicates that viewing administrator information is not harmful because MD5 encryption is only half-captured, in addition, even if the password is cracked, the admin account may not be enabled (later ). 4. Click the back button of the browser or enter wcm/app/login. jsp directly after the URL in the address bar to bypass the permission to log on:


What is the identity of this system? See: The original account is retained by the system, and the permissions are relatively large. The attached admin account is not activated:

FinishedSolution:

Wait for official repair and strictly control Access Permissions

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.