You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi, there is an external control of file name or path vulnerability (CWE-73) in inc/modules/settings/Admin.php. At line 371, the file path and content to write are both partially controlled by the attacker. Although the extension of the file is limited to .ini, the attacker can write a .user.ini file that is supported by PHP running on fastcgi to make arbitrary code execution.
Hi, there is an external control of file name or path vulnerability (CWE-73) in
inc/modules/settings/Admin.php
. At line 371, the file path and content to write are both partially controlled by the attacker. Although the extension of the file is limited to.ini
, the attacker can write a.user.ini
file that is supported by PHP running on fastcgi to make arbitrary code execution.The POC is as follows:
evil.ini
including malicious PHP code in the root directory of batflat.the content of
evil.ini
will be:.user.ini
in the root directory of batflatthe content of
.user.ini
will be:When accessing other PHP files in the same directory, the PHP code in
evil.ini
will be executed first.The text was updated successfully, but these errors were encountered: