1 Star 2 Fork 0

xieqiang / cve

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
克隆/下载
Rockoa.md 1.17 KB
一键复制 编辑 原始数据 按行查看 历史
xieqiang 提交于 2023-03-19 00:47 . update cve/Rockoa.md.

Rockoa v2.3.2 has a file upload vulnerability

Vulnerability file:qcloudCosAction.php

  1. Log in to the background to find any file upload point 输入图片说明 In fact, the upload point is the same, the call is the same interface. 输入图片说明

2.The uploaded file suffix of.php is replaced with the suffix of.uptemp and stored in the database. 输入图片说明 输入图片说明

3.While searching for the function point, I found a way to decrypt the base64 file, and fetched the corresponding data from the database according to the id. Replace the suffix of the original file with the suffix of the uploaded file, that is, the uploaded.php. 输入图片说明

  1. Access the function point through the route

输入图片说明

5.Replace the previous upload id value 输入图片说明 Found that the file has been replaced with a suffix 输入图片说明 输入图片说明

1
https://gitee.com/xieqiangweb/cve.git
git@gitee.com:xieqiangweb/cve.git
xieqiangweb
cve
cve
master

搜索帮助