You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In the CMS installation process, the configuration file filtering is not rigorous, you can insert malicious code in the installation process to execute arbitrary commands, and even get Webshell
in the install/install.php
author just check the database's name and its passwd,but not check the $dbprefix,so we can get Webshell.
and then
The text was updated successfully, but these errors were encountered:
In the CMS installation process, the configuration file filtering is not rigorous, you can insert malicious code in the installation process to execute arbitrary commands, and even get Webshell
in the install/install.php
![image](https://user-images.githubusercontent.com/41845204/62850409-58020100-bd15-11e9-9d51-14fc28c1f191.png)
author just check the database's name and its passwd,but not check the $dbprefix,so we can get Webshell.
![image](https://user-images.githubusercontent.com/41845204/62850614-f7bf8f00-bd15-11e9-82be-026c4adb08de.png)
and then
![image](https://user-images.githubusercontent.com/41845204/62850691-35bcb300-bd16-11e9-948c-fe5cb374cd5e.png)
The text was updated successfully, but these errors were encountered: