yuyuecms 1.2 File Deletion Vulnerability

www.yuyue-cms.com

yuyuecms version 1.2

1.png

Administrator / controller to delete the index method Vulnerability
2.png

See catfishcmsCatfish isPost static method

3.png

If the static method call verification

4.png

If true exec sql, then the session returns

deletefile way
5.png

isDataPath method
6.png

You can see the function of judge $ path 0,5 == data / no repalace ../../

So that we can remove the vulnerabilities /../../ filename achieved by structrue data file

poc: acquiring input codes path data /../../ filename delfile

7.png

8.png

Guess you like

Origin www.cnblogs.com/M0rta1s/p/11920882.html