제출 #625551: qiyuesuo electronic signature platform <=4.34 Scheduled task RCE정보

제목qiyuesuo electronic signature platform <=4.34 Scheduled task RCE
설명In this exploit, the attacker used the platform's scheduled task feature to upload custom Java class files and bypassed the Runtime/Process blacklist detection mechanism by concatenating strings and using reflection. Ultimately, the attacker successfully executed system commands on the server side, completing remote command execution (RCE).
원천⚠️ https://github.com/nn0nkey/nn0nkey/blob/main/QYS/QYS_task.md
사용자
 nn0nkey (UID 74287)
제출2025. 07. 30. AM 10:38 (9 개월 ago)
모더레이션2025. 08. 08. PM 10:26 (9 days later)
상태수락
VulDB 항목319298 [Qiyuesuo Eelectronic Signature Platform 까지 4.34 Scheduled Task /api/code/upload execute 파일 권한 상승]
포인트들18

Do you know our Splunk app?

Download it now for free!