| 제목 | php-business-website web 1 Unrestricted Upload |
|---|
| 설명 | The vulnerability is located in php-business-website-mainphp-business-website-mainadminabout.php (the relevant file path and file name handling code is in config.php). The code only checks whether the file name exists when uploading a file, without validating the file extension, MIME type, or content. If the server's assets/img directory has script execution permissions, an attacker can upload a malicious script disguised as an image, resulting in a server compromise. The document also records the process of exploiting the vulnerability, which involves creating a one-line PHP web shell, uploading it through the edit page at http://aaa/admin/about.php, successfully locating the corresponding file in the assets/img directory, and accessing the file to control the server via the AntSword tool. |
|---|
| 원천 | ⚠️ https://github.com/mhszed/Report/blob/main/php-business-website%20upload.docx |
|---|
| 사용자 | mahushuai (UID 91047) |
|---|
| 제출 | 2025. 11. 06. AM 11:43 (5 개월 ago) |
|---|
| 모더레이션 | 2025. 11. 16. PM 06:35 (10 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 332610 [Iqbolshoh php-business-website 까지 10677743a8dfc281f85291a27cf63a0bce043c24 /admin/about.php 권한 상승] |
|---|
| 포인트들 | 20 |
|---|