The vulnerability mainly occurs at line 78, which does not restrict files with a PHP suffix. After uploading a PHP file, the attacker determines the 'if' statement on line 82 and enters the 'require' function to include the file, resulting in RCE. Afterwards, the attacker abnormally enters the 'print' function_ Error generates an exception output. After the upgrade page is updated in line 89, it will enter line 90 for the unlink function. Therefore, our code execution can only be a one-time effect and cannot be saved for a long time
新值
By downloading https://github.com/WBCE/WBCE_CMS/releases/tag/1.6.1 After the construction is completed
Vulnerability lies in http://127.0.0.1/admin/languages/index.php
The vulnerability mainly occurs at line 78, which does not restrict files with a PHP suffix. After uploading a PHP file, the attacker determines the 'if' statement on line 82 and enters the 'require' function to include the file, resulting in RCE. Afterwards, the attacker abnormally enters the 'print' function_ Error generates an exception output. After the upgrade page is updated in line 89, it will enter line 90 for the unlink function. Therefore, our code execution can only be a one-time effect and cannot be saved for a long time
The vulnerability mainly occurs at line 78, which does not restrict files with a PHP suffix. After uploading a PHP file, the attacker determines the 'if' statement on line 82 and enters the 'require' function to include the file, resulting in RCE. Afterwards, the attacker abnormally enters the 'print' function_ Error generates an exception output. After the upgrade page is updated in line 89, it will enter line 90 for the unlink function. Therefore, our code execution can only be a one-time effect and cannot be saved for a long time
新值
By downloading https://github.com/WBCE/WBCE_CMS/releases/tag/1.6.1 After the construction is completed
Vulnerability lies in http://127.0.0.1/admin/languages/index.php
The vulnerability mainly occurs at line 78, which does not restrict files with a PHP suffix. After uploading a PHP file, the attacker determines the 'if' statement on line 82 and enters the 'require' function to include the file, resulting in RCE. Afterwards, the attacker abnormally enters the 'print' function_ Error generates an exception output. After the upgrade page is updated in line 89, it will enter line 90 for the unlink function. Therefore, our code execution can only be a one-time effect and cannot be saved for a long time