Описание
In Kooboo CMS 2.1.1.0, it is possible to upload a remote shell (e.g., aspx) to the server and then call upon it to receive a reverse shell from the victim server. The files are uploaded to /Content/Template/root/reverse-shell.aspx and can be simply triggered by browsing that URL.
Ссылки
- Vendor Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:kooboo:kooboo_cms:2.1.1.0:*:*:*:*:*:*:*
EPSS
Процентиль: 68%
0.0058
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-434
Связанные уязвимости
github
больше 3 лет назад
In Kooboo CMS 2.1.1.0, it is possible to upload a remote shell (e.g., aspx) to the server and then call upon it to receive a reverse shell from the victim server. The files are uploaded to /Content/Template/root/reverse-shell.aspx and can be simply triggered by browsing that URL.
EPSS
Процентиль: 68%
0.0058
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-434