Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qw63-pc73-846c

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Server-side request forgery in Wcms 0.3.2 lets an attacker send crafted requests from the back-end server of a vulnerable web application via the path parameter to wex/cssjs.php. It can help identify open ports, local network hosts and execute command on local services.

Server-side request forgery in Wcms 0.3.2 lets an attacker send crafted requests from the back-end server of a vulnerable web application via the path parameter to wex/cssjs.php. It can help identify open ports, local network hosts and execute command on local services.

EPSS

Процентиль: 53%
0.00304
Низкий

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 8.3
nvd
почти 5 лет назад

Server-side request forgery in Wcms 0.3.2 lets an attacker send crafted requests from the back-end server of a vulnerable web application via the path parameter to wex/cssjs.php. It can help identify open ports, local network hosts and execute command on local services.

EPSS

Процентиль: 53%
0.00304
Низкий

Дефекты

CWE-918