Create CVE-2013-2251

CVE-2013-2251
This commit is contained in:
Goby 2023-04-10 18:28:11 +08:00 committed by GitHub
parent e972fb05c4
commit 1bc24a4226
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

12
CVE-2013-2251 Normal file
View File

@ -0,0 +1,12 @@
## Superdata Software V.NET Struts2 Code Execution Vulnerability
| **Vulnerability** | **Superdata Software V.NET Struts2 Code Execution Vulnerability** |
| :----: | :-----|
| **Chinese name** | 速达软件 V.NET home 文件 存在 Struts2 代码执行漏洞 |
| **CVSS core** | 9.0 |
| **FOFA Query** (click to view the results directly)| [body="速达软件技术(广州)有限公司"](https://en.fofa.info/result?qbase64=Ym9keT0i6YCf6L6%2B6L2v5Lu25oqA5pyv77yI5bm%2F5bee77yJ5pyJ6ZmQ5YWs5Y%2B4Ig%3D%3D) |
| **Number of assets affected** | 16627 |
| **Description** | Superdata software management system is a complete set of enterprise business management system, which organically integrates enterprise purchase management, sales management, warehousing management and financial management. It is extremely easy to use and practical, and comprehensively improves enterprise management ability and work efficiency. Many products of superdata software technology (Guangzhou) Co., Ltd. have code execution vulnerabilities. The code does not filter the controllable parameters of the user, leading to the direct introduction of execution commands and codes, the execution of maliciously constructed statements, and the execution of arbitrary commands or codes through the vulnerability. Attackers can execute arbitrary commands, read and write files, etc. on the server, which is very harmful. |
| **Impact** | Because the code does not filter the user controllable parameters, it directly leads to the execution of commands and code, and executes maliciously constructed statements and arbitrary commands or code through vulnerabilities. Attackers can execute arbitrary commands, read and write files, etc. on the server, which is very harmful. |
![](https://s3.bmp.ovh/imgs/2023/04/10/df1506737795d6f4.gif)