提出 #780849: DefaultFuction CMS V1.0.0 Command Injection情報

タイトルDefaultFuction CMS V1.0.0 Command Injection
説明A Command Injection vulnerability was identified in the Content Management System. The issue occurs when the application passes user-supplied input to system shell commands (such as ping, nslookup, or traceroute) without proper validation, sanitization, or escaping. An attacker can inject arbitrary operating system commands by appending command separators or operators to the legitimate input parameter, causing the server to execute malicious commands with the privileges of the web application.
ソース⚠️ https://github.com/DefaultFuction/Content-Management-System/issues/1
ユーザー
 Practice (UID 95611)
送信2026年03月16日 14:42 (21 日 ago)
モデレーション2026年04月01日 16:02 (16 days later)
ステータス承諾済み
VulDBエントリ354667 [DefaultFuction Content-Management-System 1.0 /admin/tools.php host 特権昇格]
ポイント20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!