Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-48006: File upload vulnerability exists by modifying Upload.php configuration in backend. · Issue #35 · taogogo/taocms

An arbitrary file upload vulnerability in taocms v3.0.2 allows attackers to execute arbitrary code via a crafted PHP file. This vulnerability is exploited via manipulation of the upext variable at /include/Model/Upload.php.

CVE
#vulnerability#web#php

This is the latest 3.0.2 version of taocms.

Organize and utilize steps in two steps:

Step1:
Audit the source code "include/Model/Upload.php", line 33, the filename extension can be controlled by modifying variable "upext":

Follow up in "include/Model/File.php", line 75, there is a $this->realpath and find that it comes from $this->path, and $this->path can be passed in through the get parameter (where SYS_ROOT is the root directory of the website):

Here any changes to the variable “upext” or file “Upload.php” can be saved by the method “save” which locates at "include/Model/File.php", line 73:

At this stage, you can add “php” filename extension to the variable “upext” and click “save” to save it:

Step 2:
Next, you can upload any php file to the system:

New a.php file is successfully uploaded:

Once you uploaded file, you can open the file through the path "http://www.taocms.com:9090/a.php", and you can get shell of this system:

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907