cve/2023/CVE-2023-30258.md

21 lines
821 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-30258](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30258)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request.
### POC
#### Reference
- http://packetstormsecurity.com/files/175672/MagnusBilling-Remote-Command-Execution.html
- https://eldstal.se/advisories/230327-magnusbilling.html
#### Github
2024-05-28 08:49:17 +00:00
- https://github.com/RunasRs/Billing
2024-05-25 21:48:12 +02:00
- https://github.com/gy741/CVE-2023-30258-setup
- https://github.com/nomi-sec/PoC-in-GitHub