Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rf6m-wqqh-49rx

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In CMSuno 1.6.2, an attacker can inject malicious PHP code as a "username" while changing his/her username & password. After that, when attacker logs in to the application, attacker's code will be run. As a result of this vulnerability, authenticated user can run command on the server.

In CMSuno 1.6.2, an attacker can inject malicious PHP code as a "username" while changing his/her username & password. After that, when attacker logs in to the application, attacker's code will be run. As a result of this vulnerability, authenticated user can run command on the server.

EPSS

Процентиль: 90%
0.06009
Низкий

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 8.8
nvd
около 5 лет назад

In CMSuno 1.6.2, an attacker can inject malicious PHP code as a "username" while changing his/her username & password. After that, when attacker logs in to the application, attacker's code will be run. As a result of this vulnerability, authenticated user can run command on the server.

EPSS

Процентиль: 90%
0.06009
Низкий

Дефекты

CWE-77