There is one vulnerability that can getshell(Execute arbitrary php code)
Affected software:Soycms v3.0.2
Type of vulnerability:Execute arbitrary php code(can getshell)
Discovered by: Yu Yang
Affected URL:http://127.0.0.1/soycms/admin/index.php/Site/EditController/1
First,we can install the cms successlly,and we can create a new website
we can insert arbitrary php code in the http://xxx.xxx.xxx/'New directory'/index.php
So.Finally,we can insert the malicious code,and getshell
The text was updated successfully, but these errors were encountered:
Thank you for contacting me.
This page was created on the assumption that SSH is made editable on its own.
I will consider the action by enriching the explanation of the page.
There is one vulnerability that can getshell(Execute arbitrary php code)
Affected software:Soycms v3.0.2
Type of vulnerability:Execute arbitrary php code(can getshell)
Discovered by: Yu Yang
Affected URL:http://127.0.0.1/soycms/admin/index.php/Site/EditController/1
First,we can install the cms successlly,and we can create a new website



we can insert arbitrary php code in the http://xxx.xxx.xxx/'New directory'/index.php
So.Finally,we can insert the malicious code,and getshell
The text was updated successfully, but these errors were encountered: