mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-06 02:31:35 +00:00
13 lines
1.8 KiB
Plaintext
13 lines
1.8 KiB
Plaintext
## Superdata Software V.NET Struts2 Code Execution Vulnerability
|
|
|
|
| **Vulnerability** | **Superdata Software V.NET Struts2 Code Execution Vulnerability** |
|
|
| :----: | :-----|
|
|
| **Chinese name** | 速达软件 V.NET home 文件 存在 Struts2 代码执行漏洞 |
|
|
| **CVSS core** | 9.0 |
|
|
| **FOFA Query** (click to view the results directly)| [body="速达软件技术(广州)有限公司"](https://en.fofa.info/result?qbase64=Ym9keT0i6YCf6L6%2B6L2v5Lu25oqA5pyv77yI5bm%2F5bee77yJ5pyJ6ZmQ5YWs5Y%2B4Ig%3D%3D) |
|
|
| **Number of assets affected** | 16627 |
|
|
| **Description** | Superdata software management system is a complete set of enterprise business management system, which organically integrates enterprise purchase management, sales management, warehousing management and financial management. It is extremely easy to use and practical, and comprehensively improves enterprise management ability and work efficiency. Many products of superdata software technology (Guangzhou) Co., Ltd. have code execution vulnerabilities. The code does not filter the controllable parameters of the user, leading to the direct introduction of execution commands and codes, the execution of maliciously constructed statements, and the execution of arbitrary commands or codes through the vulnerability. Attackers can execute arbitrary commands, read and write files, etc. on the server, which is very harmful. |
|
|
| **Impact** | Because the code does not filter the user controllable parameters, it directly leads to the execution of commands and code, and executes maliciously constructed statements and arbitrary commands or code through vulnerabilities. Attackers can execute arbitrary commands, read and write files, etc. on the server, which is very harmful. |
|
|
|
|

|