P***OK全版本前台无条件RCE

Security Classification: 【C-1】 | Publish Time:2024-09-25 | Category:Old Posts | Edit
Old Version | Diff |

AI摘要:本文通过代码审计发现了一个SQL注入漏洞,利用可控的content-type字段插入恶意SQL语句,并覆盖序列化数据,最终实现RCE。构造了一个特定的gadget类,通过反序列化触发文件写入,生成webshell。利用此方法可以通过id获取shell,实现远程代码执行。 --- (来自模型:gpt-4o-mini-2024-07-18)


Web3 Info

The ownership of the data in this article is secured by blockchain encryption technology and smart contracts, and is solely owned by the creator.


Comment List

© Copyright: This article is an original work and the copyright belongs to the  Depy's docs  unless marked as Reproduced

Please contact the blogger for authorization to reprint

『📕Category 』