mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-06-20 18:00:22 +00:00
commit
8229a84e96
BIN
KlogServer/CVE-2020-35729/CVE_2020_35729.gif
Normal file
BIN
KlogServer/CVE-2020-35729/CVE_2020_35729.gif
Normal file
Binary file not shown.
After Width: | Height: | Size: 970 KiB |
11
KlogServer/CVE-2020-35729/README.md
Normal file
11
KlogServer/CVE-2020-35729/README.md
Normal file
@ -0,0 +1,11 @@
|
||||
# Klog Server Unauth RCE(CVE-2020-35729)
|
||||
|
||||
The 'authenticate.php' file uses the 'user' HTTP POST parameter in a call to the 'shell_exec()' PHP function without appropriate input validation,allowing arbitrary command execution as the apache user.
|
||||
|
||||
**Affected Version**: ≤2.4.1
|
||||
|
||||
**FOFA query rule**: [title="KLog Server" && body="authenticate.php"](https://fofa.so/result?qbase64=dGl0bGU9IktMb2cgU2VydmVyIiYmYm9keT0iYXV0aGVudGljYXRlLnBocCI%3D)
|
||||
|
||||
# Demo
|
||||
|
||||

|
BIN
Mida_eFramework/CVE-2020-15920/CVE_2020_15920.gif
Normal file
BIN
Mida_eFramework/CVE-2020-15920/CVE_2020_15920.gif
Normal file
Binary file not shown.
After Width: | Height: | Size: 713 KiB |
11
Mida_eFramework/CVE-2020-15920/README.md
Normal file
11
Mida_eFramework/CVE-2020-15920/README.md
Normal file
@ -0,0 +1,11 @@
|
||||
# Mida eFramework ajaxreq.php RCE(CVE-2020-15920)
|
||||
|
||||
There is an OS Command Injection in Mida eFramework through 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. No authentication is required.
|
||||
|
||||
**Affected Version**: ≤2.9.0
|
||||
|
||||
**FOFA query rule**: [body="eFramework.css" && body="MUP"](https://fofa.so/result?qbase64=Ym9keT0iZUZyYW1ld29yay5jc3MiICYmIGJvZHk9Ik1VUCI%3D)
|
||||
|
||||
# Demo
|
||||
|
||||

|
BIN
Nette_Framework/CVE-2020-15227/CVE_2020_15227.gif
Normal file
BIN
Nette_Framework/CVE-2020-15227/CVE_2020_15227.gif
Normal file
Binary file not shown.
After Width: | Height: | Size: 897 KiB |
11
Nette_Framework/CVE-2020-15227/README.md
Normal file
11
Nette_Framework/CVE-2020-15227/README.md
Normal file
@ -0,0 +1,11 @@
|
||||
# Nette Framework RCE(CVE-2020-15227)
|
||||
|
||||
Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework.
|
||||
|
||||
**Affected Version**: before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6
|
||||
|
||||
**FOFA query rule**: [app="NetteFramework"](https://fofa.so/result?qbase64=YXBwPSJOZXR0ZUZyYW1ld29yayI%3D)
|
||||
|
||||
# Demo
|
||||
|
||||

|
Loading…
x
Reference in New Issue
Block a user