Отправить #716077: dedecms V5.7.118 Command InjectionИнформация

Названиеdedecms V5.7.118 Command Injection
ОписаниеA vulnerability exists in DedeCMS V5.7.118 backend that allows authenticated administrators to write arbitrary PHP files to the server. The `tpl.php` file's `savetagfile` function writes user-supplied content directly to `.lib.php` files in the `include/taglib/` directory. Although the application implements malicious code detection (Lines 31-61), this protection can be bypassed using PHP's ReflectionFunction API and php://input stream wrapper, leading to Remote Code Execution (RCE).
Источник⚠️ https://note-hxlab.wetolink.com/share/ob1uepAdQwYC
Пользователь
 yu22x (UID 34832)
Представление16.12.2025 02:18 (4 месяцы назад)
Модерация21.12.2025 09:23 (5 days later)
СтатусДубликат
Запись VulDB235786 [DedeCMS до 5.7.109 HTTP POST Request /dede/tpl.php эскалация привилегий]
Баллы0

Do you want to use VulDB in your project?

Use the official API to access entries easily!