This task is identified by as the content contains sensitive information such as code security bugs, privacy leaks, etc., so it is only accessible to contributors of this repository.
WBCE CMS 1.6.1 has a File upload vulnerability via admin/languages/install.php.
The vulnerability mainly occurs at line 78, which does not restrict files with a PHP suffix. After uploading a PHP file, the attacker determines the 'if' statement on line 82 and enters the 'require' function to include the file, resulting in RCE. Afterwards, the attacker abnormally enters the 'print' function_ Error generates an exception output. After the upgrade page is updated in line 89, it will enter line 90 for the unlink function. Therefore, our code execution can only be a one-time effect and cannot be saved for a long time
New content
By downloading https://github.com/WBCE/WBCE_CMS/releases/tag/1.6.1 After the construction is completed
Vulnerability lies in http://127.0.0.1/admin/languages/index.php
The vulnerability mainly occurs at line 78, which does not restrict files with a PHP suffix. After uploading a PHP file, the attacker determines the 'if' statement on line 82 and enters the 'require' function to include the file, resulting in RCE. Afterwards, the attacker abnormally enters the 'print' function_ Error generates an exception output. After the upgrade page is updated in line 89, it will enter line 90 for the unlink function. Therefore, our code execution can only be a one-time effect and cannot be saved for a long time
The vulnerability mainly occurs at line 78, which does not restrict files with a PHP suffix. After uploading a PHP file, the attacker determines the 'if' statement on line 82 and enters the 'require' function to include the file, resulting in RCE. Afterwards, the attacker abnormally enters the 'print' function_ Error generates an exception output. After the upgrade page is updated in line 89, it will enter line 90 for the unlink function. Therefore, our code execution can only be a one-time effect and cannot be saved for a long time
New content
By downloading https://github.com/WBCE/WBCE_CMS/releases/tag/1.6.1 After the construction is completed
Vulnerability lies in http://127.0.0.1/admin/languages/index.php
The vulnerability mainly occurs at line 78, which does not restrict files with a PHP suffix. After uploading a PHP file, the attacker determines the 'if' statement on line 82 and enters the 'require' function to include the file, resulting in RCE. Afterwards, the attacker abnormally enters the 'print' function_ Error generates an exception output. After the upgrade page is updated in line 89, it will enter line 90 for the unlink function. Therefore, our code execution can only be a one-time effect and cannot be saved for a long time