Skip to content

Latest commit

 

History

History
31 lines (24 loc) · 1.67 KB

maccms10_getshell_en.md

File metadata and controls

31 lines (24 loc) · 1.67 KB

#Maccms Background arbitrary file write to getshell# #CVE-2019-9829#

version:v10 soft download:http://www.maccms.com/

Log in to the background, click on Basic -> Category Management; you can see the category page template used for each category. And you can see that the template used here is /art/type.html image

In the background, you can edit the template: Click Template - "Template Management", go to the template management area of ./template/default_pc/html/art, click Edit image input the php code image Visit index.php/art/type/id/5.html and the PHP code executes successfully. image

##code analysis##: The program was originally designed to prohibit changing the template to a PHP file: image However, when rendering the template, the program will write the template file to the cache file, and then include it with "include", so after prohibiting the template from being changed to php file, the code can still be executed.

 image  image  image