Skip to content

File upload vulnerability leads to getshell #24

@jaylan545

Description

@jaylan545

The permission settings allow a remote attacker to execute arbitrary code by uploading a file type.

Components that control system settings:install/resources/setting.php
Component for controlling product image upload:protected/controller/backend/goods_controller.php

Vulnerability Reproduction

step1
Log in to backend
step2
Add php file extension
Image
step3
Upload malicious script files through the interface for uploading product images

Image
POC:

Image
step4
通过前端页面获取文件路径

Image
getshell

Image

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions