Skip to content

The RfExample plug-in has a remote code execution vulnerability #110

@kento996

Description

@kento996

We found a remote command execution vulnerability in the RfExample plugin in the official plugin market.
In the actionCutImage() function of VideoController.php, the load method in the Modle class gets the post data:
image
Then $modle->video is parsed in getLocalFilePath; video is also CutImageForm['video'], which is discovered by debugging
CutImageForm['video'] is controllable and a malicious user can write malicious commands on the front end by controlling this value
image
Here are the results:
image

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions