Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remote Code Execution Vulnerability In MaxSite CMS v180 #487

Closed
fuzzyap1 opened this issue Feb 17, 2022 · 1 comment
Closed

Remote Code Execution Vulnerability In MaxSite CMS v180 #487

fuzzyap1 opened this issue Feb 17, 2022 · 1 comment

Comments

@fuzzyap1
Copy link

Description of Vulnerability

The arbitrary file deletion vulnerability #486 can delete ~/cms-108/uploads/.htaccess, and then in /admin/options add the types of files allowed to be uploaded, it will allows hacker to bypass the protection system protection
upload malicious php files and execute malicious php code,eventually leading to a command execution vulnerability

Proof of concept (Poc)

  1. in ~t/admin/options#a-zagruzki add 'php' in "* Разрешенные типы файлов для загрузок"
    image
    2 . Use the method of Multiple Arbitrary File Deletion vulnerabilities #486 to delete ~/cms-108/uploads/.htaccess
    image
  2. upload php files whice containing malicious code:
<?php @eval($_GET['cmd']);?>

image

  1. open the php file ~/uploads/cmd.php then rce
    image
@maxsite
Copy link
Owner

maxsite commented Feb 17, 2022

Fix #486

@maxsite maxsite closed this as completed Feb 17, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants