| Titel | DefaultFuction CMS V1.0.0 Command Injection |
|---|
| Beschreibung | A Command Injection vulnerability was identified in the Content Management System. The issue occurs when the application passes user-supplied input to system shell commands (such as ping, nslookup, or traceroute) without proper validation, sanitization, or escaping. An attacker can inject arbitrary operating system commands by appending command separators or operators to the legitimate input parameter, causing the server to execute malicious commands with the privileges of the web application.
|
|---|
| Quelle | ⚠️ https://github.com/DefaultFuction/Content-Management-System/issues/1 |
|---|
| Benutzer | Practice (UID 95611) |
|---|
| Einreichung | 16.03.2026 14:42 (vor 21 Tagen) |
|---|
| Moderieren | 01.04.2026 16:02 (16 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 354667 [DefaultFuction Content-Management-System 1.0 /admin/tools.php host erweiterte Rechte] |
|---|
| Punkte | 20 |
|---|