Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x255-hx94-phq9

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

register.php in S8Forum 3.0 allows remote attackers to execute arbitrary PHP commands by creating a user whose name ends in a .php extension and entering the desired commands into the E-mail field, which creates a web-accessible .php file that can be called by the attacker, as demonstrated using a "system($cmd)" E-mail address with a "any_name.php" username.

register.php in S8Forum 3.0 allows remote attackers to execute arbitrary PHP commands by creating a user whose name ends in a .php extension and entering the desired commands into the E-mail field, which creates a web-accessible .php file that can be called by the attacker, as demonstrated using a "system($cmd)" E-mail address with a "any_name.php" username.

EPSS

Процентиль: 90%
0.0552
Низкий

Связанные уязвимости

nvd
около 22 лет назад

register.php in S8Forum 3.0 allows remote attackers to execute arbitrary PHP commands by creating a user whose name ends in a .php extension and entering the desired commands into the E-mail field, which creates a web-accessible .php file that can be called by the attacker, as demonstrated using a "system($cmd)" E-mail address with a "any_name.php" username.

EPSS

Процентиль: 90%
0.0552
Низкий