Skip to content

YPay后台存在任意文件上传漏洞 #4

Closed as not planned
Closed as not planned
@Potatowo233

Description

@Potatowo233

漏洞方法定位于app/common/util/Upload.php类中的themePutFile(),被app/admin/controller/ypay/Home.php控制器的upload方法调用,将webshell压缩到一个zip压缩包后在网站主题上传处上传就会导致木马文件解压至/public/home目录下能够被直接访问。建议在全局解压封装一个检验的函数对解压后的文件后缀做个校验,漏洞涉及服务端权限获取,危害较大请尽快修复

在后台主题上传处上传一个打包好webshell的压缩包,漏洞证明测试用phpinfo()
image
image
然后即可将webshell上传至public/home目录下
image

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions