Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mx24-fhg2-2xq8

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PHPMyWind 5.6 is vulnerable to Remote Code Execution. Becase input is filtered without "<, >, ?, =, `,...." In WriteConfig() function, an attacker can inject php code to /include/config.cache.php file.

PHPMyWind 5.6 is vulnerable to Remote Code Execution. Becase input is filtered without "<, >, ?, =, `,...." In WriteConfig() function, an attacker can inject php code to /include/config.cache.php file.

EPSS

Процентиль: 87%
0.03282
Низкий

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 7.2
nvd
больше 4 лет назад

PHPMyWind 5.6 is vulnerable to Remote Code Execution. Becase input is filtered without "<, >, ?, =, `,...." In WriteConfig() function, an attacker can inject php code to /include/config.cache.php file.

EPSS

Процентиль: 87%
0.03282
Низкий

Дефекты

CWE-94