You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The location of the vulnerability is line 55 in \taocms\include\Model\File.php and we can see that the path parameter is passed directly to file_get_contents function without filtering
poc
After login as admin,Enter the file management interface and edit function
Get packets using brup
Any file can be read after changing the path parameter
The text was updated successfully, but these errors were encountered:
analysis
The location of the vulnerability is line 55 in \taocms\include\Model\File.php and we can see that the path parameter is passed directly to file_get_contents function without filtering
poc
After login as admin,Enter the file management interface and edit function
Get packets using brup
Any file can be read after changing the path parameter
The text was updated successfully, but these errors were encountered: