The provided text describes a remote file inclusion vulnerability in ToendaCMS due to improper input sanitization, allowing arbitrary PHP code execution. It includes a proof-of-concept URL demonstrating the exploit but lacks detailed technical analysis or exploit code.
Classification
Writeup 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:ToendaCMS 1.0.3 and prior
No auth needed
Prerequisites:Access to the target web application · Ability to host a malicious PHP file on a remote server