Логотип exploitDog
bind:CVE-2025-34030
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-34030

Количество 3

Количество 3

nvd логотип

CVE-2025-34030

8 месяцев назад

An OS command injection vulnerability exists in sar2html version 3.2.2 and prior via the plot parameter in index.php. The application fails to sanitize user-supplied input before using it in a system-level context. Remote, unauthenticated attackers can inject shell commands by appending them to the plot parameter (e.g., ?plot=;id) in a crafted GET request. The output of the command is displayed in the application's interface after interacting with the host selection UI. Successful exploitation leads to arbitrary command execution on the underlying system. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-04 UTC.

EPSS: Низкий
github логотип

GHSA-f9p6-9wvr-9crm

8 месяцев назад

An OS command injection vulnerability exists in sar2html version 3.2.2 and prior via the plot parameter in index.php. The application fails to sanitize user-supplied input before using it in a system-level context. Remote, unauthenticated attackers can inject shell commands by appending them to the plot parameter (e.g., ?plot=;id) in a crafted GET request. The output of the command is displayed in the application's interface after interacting with the host selection UI. Successful exploitation leads to arbitrary command execution on the underlying system.

EPSS: Низкий
fstec логотип

BDU:2025-07735

больше 6 лет назад

Уязвимость сценария index.php инструмента для построения графиков системной статистики sar2html, позволяющая нарушителю выполнить произвольные команды

CVSS3: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-34030

An OS command injection vulnerability exists in sar2html version 3.2.2 and prior via the plot parameter in index.php. The application fails to sanitize user-supplied input before using it in a system-level context. Remote, unauthenticated attackers can inject shell commands by appending them to the plot parameter (e.g., ?plot=;id) in a crafted GET request. The output of the command is displayed in the application's interface after interacting with the host selection UI. Successful exploitation leads to arbitrary command execution on the underlying system. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-04 UTC.

2%
Низкий
8 месяцев назад
github логотип
GHSA-f9p6-9wvr-9crm

An OS command injection vulnerability exists in sar2html version 3.2.2 and prior via the plot parameter in index.php. The application fails to sanitize user-supplied input before using it in a system-level context. Remote, unauthenticated attackers can inject shell commands by appending them to the plot parameter (e.g., ?plot=;id) in a crafted GET request. The output of the command is displayed in the application's interface after interacting with the host selection UI. Successful exploitation leads to arbitrary command execution on the underlying system.

2%
Низкий
8 месяцев назад
fstec логотип
BDU:2025-07735

Уязвимость сценария index.php инструмента для построения графиков системной статистики sar2html, позволяющая нарушителю выполнить произвольные команды

CVSS3: 10
2%
Низкий
больше 6 лет назад

Уязвимостей на страницу