You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
DedeCMS is a PHP website content management system developed. DedeCMS V5.7.115 has a command execution vulnerability, which attackers can exploit to execute malicious commands.
Vulnerability Impact
The official version of DedeCMS V5.7.115 (which is the latest version) can be downloaded from the official website: https://www.dedecms.com/download
Vulnerability Reproduction
After logging into the website backend, you can see the vulnerability point in the file manager under Modules -> Auxiliary Plugins in the left sidebar. Alternatively, you can directly access it via the following link:
When we change the file extension to .php, we can upload a custom PHP file. Through testing, we can see that certain functions are filtered, such as the following content:
<?phpphpinfo(); ?>
The specific filter functions are located in the file dede/file_manage_control.php, lines 28-54:
We can bypass the filters by truncating the file name. For example, if we want to use the system function to execute commands, we change the file name to system.php with the following content:
Vulnerability Description
DedeCMS is a PHP website content management system developed. DedeCMS V5.7.115 has a command execution vulnerability, which attackers can exploit to execute malicious commands.
Vulnerability Impact
The official version of DedeCMS V5.7.115 (which is the latest version) can be downloaded from the official website: https://www.dedecms.com/download
Vulnerability Reproduction
After logging into the website backend, you can see the vulnerability point in the file manager under Modules -> Auxiliary Plugins in the left sidebar. Alternatively, you can directly access it via the following link:
When we change the file extension to
.php
, we can upload a custom PHP file. Through testing, we can see that certain functions are filtered, such as the following content:The specific filter functions are located in the file
dede/file_manage_control.php
, lines 28-54:We can bypass the filters by truncating the file name. For example, if we want to use the
system
function to execute commands, we change the file name tosystem.php
with the following content:POC
The text was updated successfully, but these errors were encountered: