Submit #263828: DESHANG DSMall <=6.1.0 Pre-authentication arbitrary file downloadinfo

TitleDESHANG DSMall <=6.1.0 Pre-authentication arbitrary file download
DescriptionThe DSMall System, specifically in its `public/install.php` file, contains a pre-authentication arbitrary file download vulnerability. This flaw allows an attacker to bypass the installation check by setting a cookie with `action=finish` and manipulating the `step` parameter to `get_dblist`, which can facilitate a connection to an external MySQL server. For PHP versions 7.1 or below, this vulnerability can be exploited using the `load data infile` feature to read files from the client's system by setting up a rogue MySQL server. An attacker can then trigger the file download by sending a crafted GET request to the vulnerable install script, potentially leading to the execution of arbitrary code through object deserialization if a Phar file is read.
Source⚠️ https://note.zhaoj.in/share/9G6K6RBjS4M4
Userglzjin (ID 59815)
Submission2024-01-08 11:03 (4 months ago)
Moderation2024-01-11 11:23 (3 days later)
StatusPrzyjęty
VulDB Entry250431

Might our Artificial Intelligence support you?

Check our Alexa App!