In PESCMS Team 2.2.1, attackers may upload and execute arbitrary PHP code through /Public/?g=Team&m=Setting&a=upgrade by placing a .php file in a ZIP archive.More details see (https://github.com/lazyphp/PESCMS-TEAM/issues/2)
This page let user upgrade the PESCMS system manually.
Follow the mtUpgrade funtction,the upload file extension must be “zip”
and follow the unzip function
Follow the simulateInstall function and install function,we can see the file decompression in root directory
so,we can create a evil.php
and compression it as evil.zip,and upload the evil.zip,
at last ,the system decompress evil.zip and evil.php in root directory.