Title | DESHANG DSMall <=6.1.0 Pre-authentication arbitrary file download |
---|
Description | The DSMall System, specifically in its `public/install.php` file, contains a pre-authentication arbitrary file download vulnerability. This flaw allows an attacker to bypass the installation check by setting a cookie with `action=finish` and manipulating the `step` parameter to `get_dblist`, which can facilitate a connection to an external MySQL server. For PHP versions 7.1 or below, this vulnerability can be exploited using the `load data infile` feature to read files from the client's system by setting up a rogue MySQL server. An attacker can then trigger the file download by sending a crafted GET request to the vulnerable install script, potentially leading to the execution of arbitrary code through object deserialization if a Phar file is read. |
---|
Source | ⚠️ https://note.zhaoj.in/share/9G6K6RBjS4M4 |
---|
User | glzjin (ID 59815) |
---|
Submission | 2024-01-08 11:03 (4 months ago) |
---|
Moderation | 2024-01-11 11:23 (3 days later) |
---|
Status | Przyjęty |
---|
VulDB Entry | 250431 |
---|