From the provided web screenshot, we can summarize the following key information about the vulnerability: 1. **Vulnerability Title**: Arbitrary File Upload Vulnerability in Tsinghua Tongfang Electronic Archive System ≤ 3.2.210802(62532) - Stored XSS - Arbitrary File Upload - Login Bypass - Unauthorized Access. 2. **Vulnerability Author**: - Author: lame1K 3. **Affected Versions**: - Tsinghua Tongfang Electronic Archive System ≤ 3.2.210802(62532) 4. **Vendor**: - Tsinghua Tongfang 5. **Software**: - Electronic Archive System 6. **Vulnerability Description**: - This vulnerability allows attackers to upload arbitrary files, including PHP WebShells, backdoors, and other malicious scripts. - The system has multiple security flaws during the file upload process, such as improper file type validation, predictable file save paths, and insecure filename construction. 7. **Exploitation Process**: - Attackers can upload malicious scripts like PHP WebShells and execute them via the saved path. - The upload response includes the real file path, facilitating further attacks. 8. **Sensitive Information That May Be Stolen**: - Attackers can read and modify server files. - Access to databases, system commands, etc., is possible. 9. **@example Malicious Payloads**: - Several example payloads are provided, including PHP Info disclosure, simple PHP WebShells, and advanced PHP WebShells. 10. **Sensitive Information That May Be Stolen**: - Server configuration details, database credentials, file system access permissions, etc. 11. **Uploading Malicious Files**: - Attackers can upload malicious files via POST requests. 12. **Why This Vulnerability Is Severe**: - Enables remote code execution. - File upload does not require authentication. 13. **Impact of the Vulnerability**: - May lead to remote code execution, data leakage, system tampering, and other serious consequences. 14. **Mitigation Recommendations**: - Implement file type validation, rename uploaded files, restrict file permissions, and add authentication mechanisms. This information comprehensively describes the nature of the vulnerability, how it can be exploited, and potential mitigation measures, making it highly valuable for security researchers and system administrators.