Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

72crm v9 has Arbitrary file upload vulnerability in the avatar upload #36

Open
xunyang1 opened this issue Dec 4, 2022 · 0 comments
Open

Comments

@xunyang1
Copy link

xunyang1 commented Dec 4, 2022

Brief of this vulnerability

72crm v9 has Arbitrary file upload vulnerability Where to upload the avatar

Test Environment

  • Windows10
  • PHP 5.6.9+Apache/2.4.39

Affect version

72crm v9

Vulnerable Code

application\admin\controller\Users.php line 259
image
After follow-up, it was found that the validate was not set, and the move operation was performed directly, resulting in the ability to upload any file
image
follow-up move function(set filename)
line 352:
image
follow up function
Generate time-based file names with php as a suffix
image
then move_uploaded_file with this filename (thinkphp\library\think\File.php line 369)
image

Vulnerability display

First enter the background
Click as shown,go to the Enterprise management background
image
Click to change avatar
image
Capture the packet and modify the content as follows
image
Although it is judged as an illegal file, the file has been uploaded successfully, and the file path will be exposed when the debug mode is turned on
image
image
getshell
image
note:
Even if debug is not turned on, the file name can be blasted out through the file name naming rules
image

@xunyang1 xunyang1 changed the title 72crm v9 has Arbitrary file upload vulnerability 72crm v9 has Arbitrary file upload vulnerability in the avatar upload Dec 4, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant