| Название | xiaoyunjie openvpn-cms-flask 1.2.7 Command Injection |
|---|
| Описание | An authenticated remote code execution vulnerability exists in the OpenVPN user creation endpoint (app/api/v1/openvpn.py), allowing privileged users to execute arbitrary commands through malicious username parameters.
Details can be found in https://github.com/xiaoyunjie/openvpn-cms-flask/issues/24. |
|---|
| Источник | ⚠️ https://github.com/xiaoyunjie/openvpn-cms-flask/issues/24 |
|---|
| Пользователь | Tritium (UID 50779) |
|---|
| Представление | 22.06.2025 16:25 (10 месяцы назад) |
|---|
| Модерация | 27.06.2025 13:03 (5 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 314091 [xiaoyunjie openvpn-cms-flask до 1.2.7 User Creation Endpoint /app/api/v1/openvpn.py create_user Имя пользователя эскалация привилегий] |
|---|
| Баллы | 17 |
|---|