Submit #427401: Beijing Wuzhi Internet Technology Co., Ltd wuzhicms 4.1.0 Remote Command Executioninfo

TitleBeijing Wuzhi Internet Technology Co., Ltd wuzhicms 4.1.0 Remote Command Execution
DescriptionThe add method in the www/coreframe/app/content/admin/block.php file can be used to construct malicious template_comde content that will be executed when generating static HTML and write the execution result into the corresponding HTML file, causing GETSHELL
Source⚠️ https://github.com/wuzhicms/wuzhicms/issues/209
User
 LVZC (UID 74910)
Submission10/21/2024 04:26 AM (2 months ago)
Moderation10/29/2024 06:42 PM (9 days later)
StatusAccepted
VulDB Entry282444 [wuzhicms 4.1.0 block.php add/edit code injection]
Points18

Do you need the next level of professionalism?

Upgrade your account now!