Отправить #625551: qiyuesuo electronic signature platform <=4.34 Scheduled task RCEИнформация

Названиеqiyuesuo electronic signature platform <=4.34 Scheduled task RCE
ОписаниеIn this exploit, the attacker used the platform's scheduled task feature to upload custom Java class files and bypassed the Runtime/Process blacklist detection mechanism by concatenating strings and using reflection. Ultimately, the attacker successfully executed system commands on the server side, completing remote command execution (RCE).
Источник⚠️ https://github.com/nn0nkey/nn0nkey/blob/main/QYS/QYS_task.md
Пользователь
 nn0nkey (UID 74287)
Представление30.07.2025 10:38 (9 месяцы назад)
Модерация08.08.2025 22:26 (9 days later)
Статуспринято
Запись VulDB319298 [Qiyuesuo Eelectronic Signature Platform до 4.34 Scheduled Task /api/code/upload execute Файл эскалация привилегий]
Баллы18

Interested in the pricing of exploits?

See the underground prices here!