Skip to content

72crm v9 has Arbitrary file upload vulnerability #35

Open
@xunyang1

Description

Brief of this vulnerability

72crm v9 has Arbitrary file upload vulnerability Where to upload the logo

Test Environment

  • Windows10
  • PHP 5.6.9+Apache/2.4.39

Affect version

72crm v9

Vulnerable Code

application\admin\controller\System.php line 51
image
After follow-up, it was found that the validate was not set, and the move operation was performed directly, resulting in the ability to upload any file
image
follow-up move function(set filename)
line 352:
image
follow up function
Generate time-based file names with php as a suffix
image
then move_uploaded_file with this filename (thinkphp\library\think\File.php line 369)
image

Vulnerability display

First enter the background
Click as shown,go to the Enterprise management background
image
click this
image
Just upload a picture and capture the package, modify the content as follows
image
Back to enterprise management background
image
access image address
image
php code executed successfully
Notice:Because it is uploaded at the logo, unauthorized users can also access this php code
image
image

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions