Headline
CVE-2020-21516: Feehicms-2.0.8 can be attacked directly to getshell via the avatar uploads · Issue #46 · liufee/cms
There is an arbitrary file upload vulnerability in FeehiCMS 2.0.8 at the head image upload, that allows attackers to execute relevant PHP code.
There is an arbitrary file upload vulnerability in the background avatar upload.
The CMS only verified the suffix of the file in the front end by js, and we found that we could upload the PHP scripts directly after using Burp Suite for package capture modification.
The attacker can modify the box in the picture and upload the PHP script directly, It also returns the upload path(In the red box on the right of the figure above).
When the PHP file content is a Trojan, attackers can get the shell directly.
Here I used Behinder as a shell management tool, and getshell successfully.
Related news
There is an arbitrary file upload vulnerability in FeehiCMS 2.0.8.1 at the head image upload, that allows attackers to execute relevant PHP code.