Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

File upload command execution at Picture upload #70

Open
TianT1209 opened this issue Oct 7, 2022 · 0 comments
Open

File upload command execution at Picture upload #70

TianT1209 opened this issue Oct 7, 2022 · 0 comments

Comments

@TianT1209
Copy link

This is the base information of the website. It is obviously the latest version of the feehi cms. And in the advertising management of feehi cms v2.1.1, you can upload PHP file by changing the image suffix to PHP, resulting in command execution.It has a file upload vulnerability before V2.0.8 and can directly execute any code. The vulnerability number is CNVD-2022-13190 (CVE-2020-21322). The vulnerability is caused by processing image upload/common/models/AdminUser. PHP when processing image upload, rules rules is not effective, lead to the uploader can control the upload file suffix.
Snipaste_2022-10-07_10-29-22
Snipaste_2022-10-07_10-30-09
Snipaste_2022-10-07_10-15-29
Snipaste_2022-10-07_10-15-38
The first time to upload the image directly, the front end will report an error, upload failure. And as you can see, the field of User[avatar] is empty.
Then you need go back to the front end. You need to hit the delete key, at this time, select a new file to upload. After observing that AdminUser[avatar] is 0 in the data packet.
Snipaste_2022-10-07_10-15-38
Snipaste_2022-10-07_10-16-04
Snipaste_2022-10-07_10-31-25
Snipaste_2022-10-07_10-31-53
Snipaste_2022-10-07_10-16-43
image
image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant