漏洞描述:
dedecms 5.5程序泄露网站路径信息。
测试地址:
http://www.xxx.com/plus/paycenter/alipay/return_url.php
http://www.xxx.com/plus/paycenter/cbpayment/autoreceive.php
http://www.xxx.com/plus/paycenter/nps/config_pay_nps.php
http://www.xxx.com/plus/task/dede-maketimehtml.php
http://www.xxx.com/plus/task/dede-optimize-table.php
http://www.xxx.com/plus/task/dede-upcache.php
1. /phpmyadmin/libraries/lect_lang.lib.php
2./phpMyAdmin/index.php?lang[]=1
3. /phpMyAdmin/phpinfo.php
4. load_file()
5./phpmyadmin/themes/darkblue_orange/layout.inc.php
6./phpmyadmin/libraries/select_lang.lib.php
7./phpmyadmin/libraries/lect_lang.lib.php
8./phpmyadmin/libraries/mcrypt.lib.php
只显示10条记录相关文章
PHPmyadmin 2.11.4万能密码漏洞 (浏览: 17722, 评论: 0)
DeDecms xss 通杀0day 附getshell EXP (浏览: 27861, 评论: 0)
“幸福百相园”相册GETSHELL漏洞 (浏览: 35443, 评论: 0)
dedecms默认的注册用户 (浏览: 12968, 评论: 0)
dede织梦的又一个代码执行0day (浏览: 13759, 评论: 0)
分享一个判断dedecms版本的方法 (浏览: 16389, 评论: 0)
dedecms v5.3-v5.6 Get Shell 0day利用分析 (浏览: 37598, 评论: 0)
DEDE 暴文件源码AND获得后门GetShell漏洞 (浏览: 22238, 评论: 0)
dedecms 5.6 RSS订阅页面注入漏洞 (浏览: 11171, 评论: 0)