Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ukcms v1.1.7 (and other Lower version ) has a FileUpload vulnerability #1

Open
Porlockzzz opened this issue Aug 1, 2018 · 0 comments

Comments

@Porlockzzz
Copy link

Vulnerability description
The CMS background content management editor has a file uploading vulnerability. By modifying the background file upload parameter: the "Allow upload file suffix" section, you can bypass the restrictions on php file upload by cms, and then pass the Trojan horse and the getshell
poc
1.Login to the backstage as the admin;

2.add the value 'php' into 'upload_file_ext' which is a cms parameter use to limit upload suffix.(Note: use two 'php' to bypass limit eg: php,php)
url: admin.php/admin/configset/index/group/upload.html
2
3

3.Go to any page editing section,choose the upload function.
First,Modify the suffix of a PHP Trojan to .txt(Note: For pass the limit)
Second,click the button to save the upload file
Next,Use BURPSUITE for packet capture and modification,modify the suffix to .php,add some arbitrarily string before the file content(Note:For pass the file head check),and then upload it!
4
5
6
7

4.The last step,connection the trojan
8
9

Success!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant