cve/2021/CVE-2021-28940.md

18 lines
819 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-28940](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28940)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Because of a incorrect escaped exec command in MagpieRSS in 0.72 in the /extlib/Snoopy.class.inc file, it is possible to add a extra command to the curl binary. This creates an issue on the /scripts/magpie_debug.php and /scripts/magpie_simple.php page that if you send a specific https url in the RSS URL field, you are able to execute arbitrary commands.
### POC
#### Reference
- https://www.exploit-db.com/exploits/49643
#### Github
No PoCs found on GitHub currently.