Skip to content

shopxo_6.4.0_unrestricted file upload vulnerability! #86

@12qwertyuiop

Description

@12qwertyuiop

在ThemeDataService.php文件中检查了后缀但缺少对文件内容的检查
The suffix was checked in the ThemeDataService.php file but there was no checking of the file contents
Image
在thinkphp中html后缀的模板文件也能执行代码
In thinkphp, template files with html extensions can also execute code
举个例子
example

Image

Image

打包并上传
zip this folder, and upload

Image
访问?s=agreement/index/document/userprivacy.html可以看到php代码被执行
requests ?s=agreement/index/document/userprivacy.html you can see the PHP code is executed

Image

建议增加对文件内容的过滤
suggestion:add file content filter

rce.docx

payload.zip

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions