| Название | dedecms V5.7.118 Command Injection |
|---|
| Описание | A vulnerability exists in DedeCMS V5.7.118 backend that allows authenticated administrators to write arbitrary PHP files to the server. The `tpl.php` file's `savetagfile` function writes user-supplied content directly to `.lib.php` files in the `include/taglib/` directory.
Although the application implements malicious code detection (Lines 31-61), this protection can be bypassed using PHP's ReflectionFunction API and php://input stream wrapper, leading to Remote Code Execution (RCE).
|
|---|
| Источник | ⚠️ https://note-hxlab.wetolink.com/share/ob1uepAdQwYC |
|---|
| Пользователь | yu22x (UID 34832) |
|---|
| Представление | 16.12.2025 02:18 (4 месяцы назад) |
|---|
| Модерация | 21.12.2025 09:23 (5 days later) |
|---|
| Статус | Дубликат |
|---|
| Запись VulDB | 235786 [DedeCMS до 5.7.109 HTTP POST Request /dede/tpl.php эскалация привилегий] |
|---|
| Баллы | 0 |
|---|