Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5qjq-mx2m-jmx9

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Cockpit before 0.6.1 allows an attacker to inject custom PHP code and achieve Remote Command Execution via registerCriteriaFunction in lib/MongoLite/Database.php, as demonstrated by values in JSON data to the /auth/check or /auth/requestreset URI.

Cockpit before 0.6.1 allows an attacker to inject custom PHP code and achieve Remote Command Execution via registerCriteriaFunction in lib/MongoLite/Database.php, as demonstrated by values in JSON data to the /auth/check or /auth/requestreset URI.

EPSS

Процентиль: 100%
0.91149
Критический

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 9.8
redhat
около 5 лет назад

Cockpit before 0.6.1 allows an attacker to inject custom PHP code and achieve Remote Command Execution via registerCriteriaFunction in lib/MongoLite/Database.php, as demonstrated by values in JSON data to the /auth/check or /auth/requestreset URI.

CVSS3: 9.8
nvd
около 5 лет назад

Cockpit before 0.6.1 allows an attacker to inject custom PHP code and achieve Remote Command Execution via registerCriteriaFunction in lib/MongoLite/Database.php, as demonstrated by values in JSON data to the /auth/check or /auth/requestreset URI.

EPSS

Процентиль: 100%
0.91149
Критический

Дефекты

CWE-94