taocms icon indicating copy to clipboard operation
taocms copied to clipboard

arbitrary file read vulnerability

Open destinypwd opened this issue 3 years ago • 1 comments

analysis

The location of the vulnerability is line 55 in \taocms\include\Model\File.php and we can see that the path parameter is passed directly to file_get_contents function without filtering

20220110154029

20220110154107

poc

After login as admin,Enter the file management interface and edit function

1

Get packets using brup Any file can be read after changing the path parameter

20220110153415

destinypwd avatar Jan 10 '22 07:01 destinypwd

根据你的poc,这个漏洞代码应该为File.php第82-86行

xiaoabai avatar Dec 20 '22 03:12 xiaoabai