Submeter #516293: www.digiwin.com digiwin ERP system v5.0.1 Improper Sanitization of Filename to resultinformação

Títulowww.digiwin.com digiwin ERP system v5.0.1 Improper Sanitization of Filename to result
DescriçãoA file upload vulnerability has been discovered in the Digiwin ERP system that does not require authentication. This flaw permits attackers to upload arbitrary files, including potentially harmful ASPX files, which can result in remote code execution and total server compromise.
Fonte⚠️ https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_5.md
Utilizador
 XU NIE (UID 82414)
Submissão07/03/2025 16h35 (há 1 Ano)
Moderação24/03/2025 12h19 (17 days later)
EstadoAceite
Entrada VulDB300727 [Digiwin ERP 5.0.1 UploadAjaxAPI.ashx Ficheiro Elevação de Privilégios]
Pontos17

Do you need the next level of professionalism?

Upgrade your account now!