Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

phpmywind5.5 Code Execution2 #5

Open
panghusec opened this issue Aug 15, 2018 · 0 comments
Open

phpmywind5.5 Code Execution2 #5

panghusec opened this issue Aug 15, 2018 · 0 comments

Comments

@panghusec
Copy link
Owner

Attackers can get webshell or code execution

1.First download the phpmywind the Latest version from http://phpmywind.com/downloads/PHPMyWind_5.5.zip

2.install it

3.login as Admin

4.request http://localhost/admin/web_config.php

shell
(select number!!!!!)
payload 1;file_put_contents("../panghusec.txt","just a test");
burp

5.then the payload is written in the include/config.cache.php

get

then in root directory panghusec.txt will be created:-)
In summary: from admin/web_config.php Insert data into database and in lines 66 enter !Writef function and code execution :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant