![Mastering Metasploit](https://wfqqreader-1252317822.image.myqcloud.com/cover/870/36699870/b_36699870.jpg)
上QQ阅读APP看书,第一时间看更新
Attacking mechanism on the PhpCollab 2.5.1 application
The application can get compromised if an attacker uploads a malicious PHP file by sending a POST request on the /clients/editclient.php?id=1&action=update URL. The code does not validate the request if it's originating from an authenticated user or not. The problematic code is as follows:
![](https://epubservercos.yuewen.com/3A9801/19470393408885606/epubprivate/OEBPS/Images/Chapter_43.jpg?sign=1739297717-bWKnyE5YTLyRQt1dBhEh9pCWqCAiluPl-0-f29ad10bbcefb8a237c3af81f90b2275)
From line number 2, we can see that the uploaded file is saved to the logos_clients directory with the name as $id followed by the $extention, which means that since we have id=1 in the URL, the uploaded backdoor will be saved as 1.php in the logos_clients directory.
For more information on this vulnerability, refer to: https://sysdream.com/news/lab/2017-09-29-cve-2017-6090-phpcollab-2-5-1-arbitrary-file-upload-unauthenticated/.