提出 #516293: www.digiwin.com digiwin ERP system v5.0.1 Improper Sanitization of Filename to result情報

タイトルwww.digiwin.com digiwin ERP system v5.0.1 Improper Sanitization of Filename to result
説明A file upload vulnerability has been discovered in the Digiwin ERP system that does not require authentication. This flaw permits attackers to upload arbitrary files, including potentially harmful ASPX files, which can result in remote code execution and total server compromise.
ソース⚠️ https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_5.md
ユーザー
 XU NIE (UID 82414)
送信2025年03月07日 16:35 (1 年 ago)
モデレーション2025年03月24日 12:19 (17 days later)
ステータス承諾済み
VulDBエントリ300727 [Digiwin ERP 5.0.1 UploadAjaxAPI.ashx ファイル 特権昇格]
ポイント17

Interested in the pricing of exploits?

See the underground prices here!