Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-49544 PoC — Customer Support System 安全漏洞

Source
Associated Vulnerability
Title:Customer Support System 安全漏洞 (CVE-2023-49544)
Description:Customer Support System是oretnom23个人开发者的一个客户支持系统,可以帮助某个企业或公司在客户从他们那里购买产品后提供客户支持。 Customer Support System v1 版本存在安全漏洞,该漏洞源于通过 /customer_support/index.php 中的 page= 参数可以再未经授权情况下进行访问。
Description
Customer Support System 1.0 - Local File Inclusion
Readme
# CVE-2023-49544
# Customer Support System 1.0 - Local File Inclusion

**Description**: Customer Support System 1.0 is vulnerable to Local File Inclusion. An authenticated user has the capability to access and read PHP files from the operating system by exploiting a Local File Inclusion (LFI) vulnerability through the wrapper filter.

**Vulnerable Product Version**: Customer Support System 1.0  
**CVE Author**: Geraldo Alcântara  
**Date**.: 28/11/2023  
**Confirmed on**: 19/12/2023  
**CVE**: CVE-2023-49544     
**Tested on**: Windows  
### Steps to reproduce:  
1. Log in to the application with any user.  
2. Modify the vulnerable "page" parameter to exploit the vulnerability.  
Payload: php://filter/convert.base64-encode/resource=C:\xampp\htdocs\customer_support\db_connect    

Exploiting the vulnerability and retrieving the content of the PHP file in base64.
![lfi01](https://github.com/geraldoalcantara/LFI_Customer_Support_System-/assets/152064551/7482329e-af58-4829-971a-91d539d8b13e)

Reading the content of the file (Base64 decoded).
![lfi02](https://github.com/geraldoalcantara/LFI_Customer_Support_System-/assets/152064551/9488f5ac-4903-4879-bc60-6cbe70b55ad0)

Discoverer(s)/Credits:  
Geraldo Alcântara  
File Snapshot

[4.0K] /data/pocs/84ca71e1ce3fd22cfb529ad4e7641e533013f1f7 └── [1.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.