जमा करें #457865: https://github.com/WeiYe-Jing/ https://github.com/WeiYe-Jing/datax-web 2.1.1 OS Command Injectionजानकारी

शीर्षकhttps://github.com/WeiYe-Jing/ https://github.com/WeiYe-Jing/datax-web 2.1.1 OS Command Injection
विवरणRemote Code Execution (RCE) refers to an attack where an attacker can execute arbitrary code on a remote computer, thereby gaining control over and compromising the target system. The attacker can execute this code without any user interaction, allowing them to infiltrate the target system and perform a wide range of malicious activities. These activities may include stealing sensitive information, altering data, spreading viruses or malware, and other harmful actions. The `glueSource` parameter of the /api/job/add/ endpoint is vulnerable to Remote Code Execution (RCE).
स्रोत⚠️ https://github.com/jxp98/VulResearch/blob/main/2024/12/1.Datax-Web%20-%20Remote%20Code%20Execution.md
उपयोगकर्ता
 jxp. (UID 64049)
सबमिशन06/12/2024 10:23 AM (1 वर्ष पहले)
संयम08/12/2024 09:40 PM (2 days later)
स्थितिस्वीकृत
VulDB प्रविष्टि287277 [WeiYe-Jing datax-web 2.1.1 /api/job/add/ glueSource अधिकार वृद्धि]
अंक20

Want to know what is going to be exploited?

We predict KEV entries!