链接:http://seclists.org/fulldisclosure/2013/Jan/261?utm_source=twitterfeed&utm_medium=twitter *>测试方法: --------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负! 1]======== sync.cgi unauthenticated arbitrary file download ======== Requesting an unprotected cgi, it"s possible, for an unauthenticated user, to download any system file, included /etc/shadow, that contains the password shadows for the application/system users.
2]======== dynamic.pl NTP command injection ======== This vulnerability allows authenticated users to execute arbitrary commands on the system with root privileges.
This is a sample request: ##################################### POST /dynamic.pl HTTP/1.1 Content-Length: 89 Cookie: webui_session_admin=xxxxxxxxxxxxxxxxxxxxxx_en_0