PlaySMs 1.4 'import.php'...

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

# Description Code Execution using `import.php` We know import.php accept file and just read content not stored in server. But when we stored payload in our backdoor.csv and upload to phonebook. Its execute our payload and show on next page in field (in NAME,MOBILE,Email,Group COde,Tags) accordingly . In My case i stored my vulnerable code in my backdoor.csv files's Name field . But There is one problem in execution. Its only execute in built function and variable which is used in application. That why the server not execute our payload directly. Now i Use `<?php $a=$_SERVER['HTTP_USER_AGENT']; system($a); ?>` in name field and change our user agent to any command which u want to execute command. Bcz it not execute `<?php system("id")?>` directly . Example of my `backdoor.csv` file content ``` ----------------------MY FILE CONTENT------------------------------------ Name Mobile Email Group code Tags <?php $t=$_SERVER['HTTP_USER_AGENT']; system($t); ?> 22 --------------------MY FILE...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息