[{"createTime":1735734952000,"id":1,"img":"hwy_ms_500_252.jpeg","link":"https://activity.huaweicloud.com/cps.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=V1g3MDY4NTY=&utm_medium=cps&utm_campaign=201905","name":"华为云秒杀","status":9,"txt":"华为云38元秒杀","type":1,"updateTime":1735747411000,"userId":3},{"createTime":1736173885000,"id":2,"img":"txy_480_300.png","link":"https://cloud.tencent.com/act/cps/redirect?redirect=1077&cps_key=edb15096bfff75effaaa8c8bb66138bd&from=console","name":"腾讯云秒杀","status":9,"txt":"腾讯云限量秒杀","type":1,"updateTime":1736173885000,"userId":3},{"createTime":1736177492000,"id":3,"img":"aly_251_140.png","link":"https://www.aliyun.com/minisite/goods?userCode=pwp8kmv3","memo":"","name":"阿里云","status":9,"txt":"阿里云2折起","type":1,"updateTime":1736177492000,"userId":3},{"createTime":1735660800000,"id":4,"img":"vultr_560_300.png","link":"https://www.vultr.com/?ref=9603742-8H","name":"Vultr","status":9,"txt":"Vultr送$100","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":5,"img":"jdy_663_320.jpg","link":"https://3.cn/2ay1-e5t","name":"京东云","status":9,"txt":"京东云特惠专区","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":6,"img":"new_ads.png","link":"https://www.iodraw.com/ads","name":"发布广告","status":9,"txt":"发布广告","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":7,"img":"yun_910_50.png","link":"https://activity.huaweicloud.com/discount_area_v5/index.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=aXhpYW95YW5nOA===&utm_medium=cps&utm_campaign=201905","name":"底部","status":9,"txt":"高性能云服务器2折起","type":2,"updateTime":1735660800000,"userId":3}]
<>0X01正文
打开网站……
先用7kb扫一波目录。
哦吼,发现了一堆的目录遍历(绿色的都是)
这里一个 Log目录十分的显眼,很有可能造成log泄露。
okey,如我所料
收获了一个通用中危洞 √
27450-kwvsjna88f.png
同时我找到了代表用户名的dlm
接下来,我就从日志文件中收集了一波泄露用户名,然后爆破它
好了,弱口令数量+1
挖洞不是有手就行吗
接着来,登入后台后,我们点开更改头像。
这个oa系统,文件上传地方仅在前端效验后缀,轻松可以绕过。
然后直接连接上菜刀就好了……
文件上传漏洞+1
接下来,我发现在日志那有个有趣的地方
通过修改zybh的值,我们可以看到其他人的名字+ip(不过没什么软用)
这里重点不在水平越权。
当我习惯性的给id来一个单引号的时候,意外的惊喜也来了。
这十有八九存在着sql注入
我们用burp抓个包扔sqlmap跑一下看看
行了,爆个库名就好了
年轻人要懂得见好就收
这样sql注入漏洞 √
所以说嘛,挖洞靠的是耐心和细心
很多bro经常说挖不到洞,就要自己想想原因了
<>0X02末尾
正当我要继续挖掘漏洞的时候…
“苍茫滴天涯是我的爱”
噢,原来这一切都是我在做梦啊
不说了兄弟们,我要去搬砖了
火线Zone是[火线安全平台]运营的封闭式实战安全攻防社区,研究讨论实战攻防技术,平台向顶尖的白帽子提供安全测试的云端基础设施,目前火线的高级白帽子数量已经近万人,欢迎具备分享和探索精神的白帽子加入火线Zone社区,共建一个有技术氛围的优质社区!