| Titel | www.digiwin.com digiwin ERP system v5.0.1 Improper Sanitization of Filename to result |
|---|
| Beschreibung | A file upload vulnerability has been discovered in the Digiwin ERP system that does not require authentication. This flaw permits attackers to upload arbitrary files, including potentially harmful ASPX files, which can result in remote code execution and total server compromise. |
|---|
| Quelle | ⚠️ https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_5.md |
|---|
| Benutzer | XU NIE (UID 82414) |
|---|
| Einreichung | 07.03.2025 16:35 (vor 1 Jahr) |
|---|
| Moderieren | 24.03.2025 12:19 (17 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 300727 [Digiwin ERP 5.0.1 UploadAjaxAPI.ashx Datei erweiterte Rechte] |
|---|
| Punkte | 17 |
|---|