A failed colored APP penetration

Foreword

I remembered that there was a colored APP in my hand on the weekend. I was a bit lonely and watched the film. Bah, am I that kind of person? After reading the articles of the big brothers, there should be quite a lot of loopholes in this APP (website).

test

First open like this

There is no loophole in the registration and login operation. You can blast the account and password, but it is of little significance and skip directly.

Look at the crawler and find an api

The single quotation mark gives an error and is injected into the hand. thinkphp version 5.0.12

Check his background user password, at this time --os-shell also failed

Play a wave of thinkphp RCE to see, it was unsuccessful. (I can only use the payload, it is too bad)

At the time, I found an article while searching for historical vulnerabilities in Google.

(The above URL can't be found, only the webpage snapshot can be seen) Find the reprinted article

Then use Google grammar to find the article

Finally find the blog address of the big brother, and then find the original article on the blog

There is an upload to read the article of the big brother, guess it is the upload place of the avatar

When the computer opens the URL, it automatically jumps to https and the website will not open. Then found that only http can be opened, and finally found that using a mobile phone can successfully open http without automatic jump

When I found that I could not get a shell, I went out to eat a meal and came back to find that the website could not be opened. It is impossible to close a station, it should be a domain name change.

to sum up

Dish is original sin ...

Guess you like

Origin www.cnblogs.com/yuyan-sec/p/12683201.html