Отправить #516293: www.digiwin.com digiwin ERP system v5.0.1 Improper Sanitization of Filename to resultИнформация

Названиеwww.digiwin.com digiwin ERP system v5.0.1 Improper Sanitization of Filename to result
ОписаниеA file upload vulnerability has been discovered in the Digiwin ERP system that does not require authentication. This flaw permits attackers to upload arbitrary files, including potentially harmful ASPX files, which can result in remote code execution and total server compromise.
Источник⚠️ https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_5.md
Пользователь
 XU NIE (UID 82414)
Представление07.03.2025 16:35 (1 Год назад)
Модерация24.03.2025 12:19 (17 days later)
Статуспринято
Запись VulDB300727 [Digiwin ERP 5.0.1 UploadAjaxAPI.ashx Файл эскалация привилегий]
Баллы17

Want to stay up to date on a daily basis?

Enable the mail alert feature now!