You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Build the source code locally by downloading:https://gitee.com/ibos/IBOS
The vulnerability exists:http://127.0.0.1/?r=dashboard/default/index
First, log in to the backend management and enter General Settings ->Login Page Background. The routing is at /?r=dashboard/default/index:
Using burp:
Change the path to the api/authlogin.php file in the current website directory:
Sending data packet, found that the file has been moved to the data\login directory:
At this point, the file authlogin.php was only moved to a new directory, and then we overwritten the previously copied file authlogin.php with api\wxqy\callback.php in the root directory of the file website:
Sending data packet, found that the previous authlogin.php has been deleted:
Next, try deleting files outside the website directory. First, create an a.txt file in the installation directory of the website, and then construct the data package:
After sending the data packet, a.txt has been copied to the data\login directory and can be accessed:
EXP:
Build the source code locally by downloading:https://gitee.com/ibos/IBOS








The vulnerability exists:http://127.0.0.1/?r=dashboard/default/index
First, log in to the backend management and enter General Settings ->Login Page Background. The routing is at /?r=dashboard/default/index:
Using burp:
Change the path to the api/authlogin.php file in the current website directory:
Sending data packet, found that the file has been moved to the data\login directory:
At this point, the file authlogin.php was only moved to a new directory, and then we overwritten the previously copied file authlogin.php with api\wxqy\callback.php in the root directory of the file website:
Sending data packet, found that the previous authlogin.php has been deleted:
Next, try deleting files outside the website directory. First, create an a.txt file in the installation directory of the website, and then construct the data package:
After sending the data packet, a.txt has been copied to the data\login directory and can be accessed:
EXP:
The text was updated successfully, but these errors were encountered: