Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

PHP command execution exists in edit blog template in monstra 3.0.4 #468

Open
yanqian1993 opened this issue May 28, 2020 · 0 comments
Open

Comments

@yanqian1993
Copy link

Vulnerability profile:
In edit blog template, we can control the website system by writing PHP executable code and running malicious code
Test environment: PHP version 5.6.2 +appach
Affected version
<=3.0.4
Vulnerability details:

  1. Use the administrative user to log in to the website: http://ip:port/monstra/admin/index.php?id=themes&action=edit_ template&filename=blog

2.Write PHP executable code in template content

image

3.Save the modified template content,visit:http://ip:port/monstra/blog
Get shell and control the website
image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant