2024-05-25 21:48:12 +02:00
### [CVE-2021-3291](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3291)



### Description
Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command.
### POC
#### Reference
- http://packetstormsecurity.com/files/161613/Zen-Cart-1.5.7b-Remote-Code-Execution.html
- https://github.com/MucahitSaratar/zencart_auth_rce_poc
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/EdgeSecurityTeam/Vulnerability
- https://github.com/ImHades101/CVE-2021-3291
2024-06-22 09:37:59 +00:00
- https://github.com/MucahitSaratar/zencart_auth_rce_poc
2024-05-25 21:48:12 +02:00
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
- https://github.com/tzwlhack/Vulnerability
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve