Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Command execution vulnerability in /wms/src/system/databak.php #10

Open
Juneah opened this issue May 21, 2021 · 0 comments
Open

Command execution vulnerability in /wms/src/system/databak.php #10

Juneah opened this issue May 21, 2021 · 0 comments

Comments

@Juneah
Copy link

Juneah commented May 21, 2021

Vulnerability Type :

Command execution

Vulnerability Version :

1.1

Recurring environment:

Windows Server 2012
PHP 5.5.38
Apache 2.4
Mysql 5.6

Vulnerability Description AND recurrence:

During installation, use the db_wms_2013_12_31_15_48_34.sql file in the \system\ directory for installation

In the /system/databak.php file, the parameter filename was received through $_POST, and it was not filtered. The exec function was brought in, resulting in a command execution vulnerability.

$J3YP@2HTTM~2DRV}(OHZ3I

There is no echo here, let's test adding a system user here
_7G3ND54XZ@0C5_NL1`4TP2

payload: filename=1 || net user test /add

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant