Описание
PbootCMS 1.2.2 allows remote attackers to execute arbitrary PHP code by specifying a .php filename in a "SET GLOBAL general_log_file" statement, followed by a SELECT statement containing this PHP code.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:pbootcms:pbootcms:1.2.2:*:*:*:*:*:*:*
EPSS
Процентиль: 76%
0.0093
Низкий
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-94
Связанные уязвимости
CVSS3: 7.2
github
больше 3 лет назад
PbootCMS 1.2.2 allows remote attackers to execute arbitrary PHP code by specifying a .php filename in a "SET GLOBAL general_log_file" statement, followed by a SELECT statement containing this PHP code.
EPSS
Процентиль: 76%
0.0093
Низкий
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-94