Giter Site home page Giter Site logo

wukongopensource / wukongcrm-9.0-php Goto Github PK

View Code? Open in Web Editor NEW
675.0 47.0 283.0 36.26 MB

悟空CRM-基于TP5.0+vue+ElementUI的前后端分离CRM系统

Home Page: http://www.5kcrm.com

License: Other

PHP 56.94% HTML 0.57% JavaScript 4.12% CSS 0.60% PLpgSQL 0.07% Smarty 0.58% Vue 35.53% SCSS 1.60%

wukongcrm-9.0-php's Introduction

悟空CRM(9.0版本)

悟空软件长期为企业提供企业管理软件(CRM/HRM/OA/ERP等)的研发、实施、营销、咨询、培训、服务于一体的信息化服务。悟空软件以高科技为起点,以技术为核心、以完善的售后服务为后盾,秉承稳固与发展、求实与创新的精神,已为国内外上千家企业提供服务。

悟空的发展受益于开源,也会回馈于开源。2019年,悟空CRM会继续秉承“拥抱开放、合作共赢、创造价值”的理念,在开源的道路上继续砥砺前行,和更多的社区开发者一起为国内外开源做出积极贡献。

官网:http://www.5kcrm.com

官网:http://www.72crm.com

论坛:http://bbs.72crm.net

演示地址:demo9.5kcrm.net(帐号:18888888888 密码:123456)

码云地址:https://gitee.com/wukongcrm

QQ群交流群⑩群:486745026

悟空CRM采用全新的前后端分离模式,本仓库代码中已集成前端vue打包后文件,可免去打包操作

如需调整前端代码,请单独下载前端代码,前端代码在根目录的ux文件夹中

主要技术栈

后端框架:ThinkPHP 5.0.2

前端MVVM框架:Vue.JS 2.5.x

路由:Vue-Router 3.x

数据交互:Axios

UI框架:Element-UI 2.6.3

悟空crm9.0的运行环境要求PHP5.6以上

一键安装

代码中已集成前端vue打包后文件,可免去打包操作: 以本地(phpstudy集成环境)搭建举例: 下载悟空CRM9.0开源版,在服务器根目录(www目录)下创建72crm文件夹,并放置代码; 浏览器访问

http://localhost/72crm/index.php/admin/install/index.html 

根据安装提示步骤,完成悟空CRM9.0 的部署安装

开发依赖(需个性化安装或调整前端代码请按照以下教程,一键安装用户可忽略)

数据交互

数据交互通过axios以及RESTful架构来实现 用户校验通过登录返回的auth_key放在header 值得注意的一点是:跨域的情况下,会有预请求OPTION的情况

Server搭建

服务端使用的框架为thinkphp5.0.2,搭建前请确保拥有lamp/lnmp/wamp环境。

这里所说的搭建其实就是把server框架放入WEB运行环境,并使用80端口。 导入服务端根文件夹数据库文件public/sql/5kcrm.sql,并修改config/database.php配置文件。

配置要求

PHP >= 5.6.0 当访问 http://localhost/, 出现“悟空软件”即代表后端接口搭建成功。

前端部署

安装node.js 前端部分是基于node.js上运行的,所以必须先安装node.js,版本要求为6.0以上

使用npm安装依赖 下载悟空CRM9.0前端代码; 可将代码放置在后端同级目录frontend,执行命令安装依赖:

npm install

修改内部配置 修改请求地址或域名:config/dev.env.js里修改BASE_API(开发环境服务端地址,默认localhost) 修改自定义端口:config/index.js里面的dev对象的port参数(默认8080,不建议修改)

运行前端

 npm run dev

注意:前端服务启动,默认会占用8080端口,所以在启动前端服务之前,请确认8080端口没有被占用。 程序运行之前需搭建好Server端

系统介绍

以下为悟空CRM9.0 部分功能系统截图

wukongcrm-9.0-php's People

Contributors

gspiriter avatar wukongsoftware avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

wukongcrm-9.0-php's Issues

大量报错,子类方法与父类参数不匹配。 犯这种低级错误? 你们开发软件有用心么?

Declaration of app\admin\model\File::createData($files, $param, $x = '150', $y = '150') should be compatible with app\admin\model\Common::createData($param)

admin/model/common.php
public function delDataById($id = '', $delSon = false)

application\admin\model\Group.php 里。
//删除角色 public function delDataById($group_id) { $dataInfo = $this->get($group_id); if(!$dataInfo){ $this->error = '该角色不存在或已删除';

72crm v9 has sql injection vulnerability

Brief of this vulnerability

72crm v9 has sql injection vulnerability in View the task calendar

Test Environment

  • Windows10
  • PHP 5.6.9+Apache/2.4.39

Affect version

72crm v9

Vulnerable Code

application\work\controller\Task.php line 506

The $param parameter is passed to getDateList

image

The start_time parameter and stop_time parameter are directly spliced ​​into $whereDate, and then executed on line 493. resulting in sql injection vulnerability

image

Vulnerability display

First enter the background

Click as shown,go to the View the task calendar and capture the packet

image

image

payload: start_time=1&stop_time=1))+or+sleep(2)--+

Sleep successfully for 2 seconds

image

If debug mode is enabled
image
payload:start_time=1&stop_time=1))+or+updatexml(1,concat(0x7e,database(),0x7e,version()),1)--+
image
Successfully obtained the database name and version number

No language selection available

Hey this is Philipp from Germany, I just installed this application on my local server. But i can't find the language selection. My chinese skills are like zero, but i like this software and I want to use it :)

Declaration of app\admin\model\Group::delDataById($group_id, $delSon = false) should be compatible with app\admin\model\Common::delDataById($id = '', $delSon = false)

https://github.com/72crm/72crm/blob/58d446279867ab3f5f171fc2173bbd5fa438cfbb/application/admin/model/Group.php#L106

PHP7.2.10 下delDataById方法重写,由于参数不同报错(php5.6没问题)
源代码位置:/application/admin/model/Group.php#L106
源代码:public function delDataById($group_id)
建议修改为:public function delDataById($group_id= '', $delSon = false)

登录频繁退出

为什么总是出现登录了没多久,就被迫退出的情况?

Trying to get in touch regarding a security issue

Hey there!

I'd like to report a security issue but cannot find contact instructions on your repository.

If not a hassle, might you kindly add a SECURITY.md file with an email, or another contact method? GitHub recommends this best practice to ensure security issues are responsibly disclosed, and it would serve as a simple instruction for security researchers in the future.

Thank you for your consideration, and I look forward to hearing from you!

(cc @huntr-helper)

良心作品--数据导出报错

类型错误: Argument 3 passed to app\admin\model\Excel::exportCsv() must be an instance of app\admin\model\callback, instance of Closure given, called in /www/wwwroot/crm.95ym.cn/application/crm/controller/Customer.php on line 581

导出报错

72crm v9 has Arbitrary file upload vulnerability

Brief of this vulnerability

72crm v9 has Arbitrary file upload vulnerability Where to upload the logo

Test Environment

  • Windows10
  • PHP 5.6.9+Apache/2.4.39

Affect version

72crm v9

Vulnerable Code

application\admin\controller\System.php line 51
image
After follow-up, it was found that the validate was not set, and the move operation was performed directly, resulting in the ability to upload any file
image
follow-up move function(set filename)
line 352:
image
follow up function
Generate time-based file names with php as a suffix
image
then move_uploaded_file with this filename (thinkphp\library\think\File.php line 369)
image

Vulnerability display

First enter the background
Click as shown,go to the Enterprise management background
image
click this
image
Just upload a picture and capture the package, modify the content as follows
image
Back to enterprise management background
image
access image address
image
php code executed successfully
Notice:Because it is uploaded at the logo, unauthorized users can also access this php code
image
image

致命错误: [] operator not supported for strings

请求模块:/admin/users/index
请求主体:page=1&limit=15&search=&structure_id=2&status=all
具体代码:
$groups = '';
$groupids = '';
foreach ($groupsArr as $key=>$val) {
$groups[] = $val['title'];
$groupids[] = $val['id'];
}
错误说明:$groups = '';$groupids = '';定义为字符类型,后面以数组操作导致报错。。。

72crm v9 has Arbitrary file upload vulnerability in the avatar upload

Brief of this vulnerability

72crm v9 has Arbitrary file upload vulnerability Where to upload the avatar

Test Environment

  • Windows10
  • PHP 5.6.9+Apache/2.4.39

Affect version

72crm v9

Vulnerable Code

application\admin\controller\Users.php line 259
image
After follow-up, it was found that the validate was not set, and the move operation was performed directly, resulting in the ability to upload any file
image
follow-up move function(set filename)
line 352:
image
follow up function
Generate time-based file names with php as a suffix
image
then move_uploaded_file with this filename (thinkphp\library\think\File.php line 369)
image

Vulnerability display

First enter the background
Click as shown,go to the Enterprise management background
image
Click to change avatar
image
Capture the packet and modify the content as follows
image
Although it is judged as an illegal file, the file has been uploaded successfully, and the file path will be exposed when the debug mode is turned on
image
image
getshell
image
note:
Even if debug is not turned on, the file name can be blasted out through the file name naming rules
image

宝塔面板Nginx的装上用不了

宝塔面板Nginx的装上用不了,用宝塔系统自带的伪静态转换规则转换了之后用不了,不知道是伪静态的问题还是,不支持宝塔的环境呢,希望出一个宝塔Nginx的安装教程

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.