cve/2023/CVE-2023-41892.md

30 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-41892](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41892)
![](https://img.shields.io/static/v1?label=Product&message=cms&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%204.0.0-RC1%2C%20%3C%3D%204.4.14%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brighgreen)
### Description
Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.
### POC
#### Reference
- http://packetstormsecurity.com/files/176303/Craft-CMS-4.4.14-Remote-Code-Execution.html
#### Github
- https://github.com/Faelian/CraftCMS_CVE-2023-41892
- https://github.com/LucaLeukert/HTB-Surveillance
- https://github.com/Marco-zcl/POC
- https://github.com/XRSec/AWVS-Update
- https://github.com/acesoyeo/CVE-2023-41892
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/diegaccio/Craft-CMS-Exploit
- https://github.com/nomi-sec/PoC-in-GitHub
2024-06-07 04:52:01 +00:00
- https://github.com/tanjiti/sec_profile
2024-05-28 08:49:17 +00:00
- https://github.com/wjlin0/poc-doc
2024-05-25 21:48:12 +02:00
- https://github.com/wy876/POC
- https://github.com/xingchennb/POC-
- https://github.com/zaenhaxor/CVE-2023-41892