Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-28114: Arbitrary file deletion vulnerability · Issue #I4ZRMW · 德尚网络/DSCMS_open - Gitee.com

DSCMS v3.0 was discovered to contain an arbitrary file deletion vulnerability via /controller/Adv.php.

CVE
#vulnerability#git#php

Arbitrary file deletion vulnerability

评论 (0)

原值

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120106_6dbf5607_9830429.jpeg “111.jpg”)

Create a test php file

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120303_a26bb592_9830429.jpeg “112.jpg”)

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120145_7eb05daa_9830429.jpeg “555.jpg”)

Payload

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120338_21e5893e_9830429.jpeg “777.jpg”)

Delete success

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120438_ac42c3cf_9830429.jpeg “999.jpg”)

新值

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120106_6dbf5607_9830429.jpeg “111.jpg”)

Create a test php file

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/124119_947e90b5_9830429.jpeg “333.jpg”)

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120145_7eb05daa_9830429.jpeg “555.jpg”)

Payload

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120338_21e5893e_9830429.jpeg “777.jpg”)

Delete success

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120438_ac42c3cf_9830429.jpeg “999.jpg”)

原值

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120106_6dbf5607_9830429.jpeg “111.jpg”)

Create a test php file

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/124119_947e90b5_9830429.jpeg “333.jpg”)

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120145_7eb05daa_9830429.jpeg “555.jpg”)

Payload

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120338_21e5893e_9830429.jpeg “777.jpg”)

Delete success

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120438_ac42c3cf_9830429.jpeg “999.jpg”)

新值

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120106_6dbf5607_9830429.jpeg “111.jpg”)

Create a test php file

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/124214_0a757e11_9830429.jpeg “333.jpg”)

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120145_7eb05daa_9830429.jpeg “555.jpg”)

Payload

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120338_21e5893e_9830429.jpeg “777.jpg”)

Delete success

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120438_ac42c3cf_9830429.jpeg “999.jpg”)

原值

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120106_6dbf5607_9830429.jpeg “111.jpg”)

Create a test php file

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/124214_0a757e11_9830429.jpeg “333.jpg”)

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120145_7eb05daa_9830429.jpeg “555.jpg”)

Payload

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120338_21e5893e_9830429.jpeg “777.jpg”)

Delete success

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120438_ac42c3cf_9830429.jpeg “999.jpg”)

新值

Repair

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/124324_667a2c8b_9830429.jpeg “xiufu.jpg”)

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120106_6dbf5607_9830429.jpeg “111.jpg”)

Create a test php file

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/124214_0a757e11_9830429.jpeg “333.jpg”)

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120145_7eb05daa_9830429.jpeg “555.jpg”)

Payload

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120338_21e5893e_9830429.jpeg “777.jpg”)

Delete success

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120438_ac42c3cf_9830429.jpeg “999.jpg”)

原值

Repair

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/124324_667a2c8b_9830429.jpeg “xiufu.jpg”)

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120106_6dbf5607_9830429.jpeg “111.jpg”)

Create a test php file

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/124214_0a757e11_9830429.jpeg “333.jpg”)

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120145_7eb05daa_9830429.jpeg “555.jpg”)

Payload

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120338_21e5893e_9830429.jpeg “777.jpg”)

Delete success

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120438_ac42c3cf_9830429.jpeg “999.jpg”)

新值

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120106_6dbf5607_9830429.jpeg “111.jpg”)

Create a test php file

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/124214_0a757e11_9830429.jpeg “333.jpg”)

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120145_7eb05daa_9830429.jpeg “555.jpg”)

Payload

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120338_21e5893e_9830429.jpeg “777.jpg”)

Delete success

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/120438_ac42c3cf_9830429.jpeg “999.jpg”)

Repair

![输入图片说明](https://images.gitee.com/uploads/images/2022/0327/124324_667a2c8b_9830429.jpeg “xiufu.jpg”)

登录 后才可以发表评论

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907