| 标题 | https://github.com/WeiYe-Jing/ https://github.com/WeiYe-Jing/datax-web 2.1.1 OS Command Injection |
|---|
| 描述 | Remote Code Execution (RCE) refers to an attack where an attacker can execute arbitrary code on a remote computer, thereby gaining control over and compromising the target system. The attacker can execute this code without any user interaction, allowing them to infiltrate the target system and perform a wide range of malicious activities. These activities may include stealing sensitive information, altering data, spreading viruses or malware, and other harmful actions.
The `glueSource` parameter of the /api/job/add/ endpoint is vulnerable to Remote Code Execution (RCE). |
|---|
| 来源 | ⚠️ https://github.com/jxp98/VulResearch/blob/main/2024/12/1.Datax-Web%20-%20Remote%20Code%20Execution.md |
|---|
| 用户 | jxp. (UID 64049) |
|---|
| 提交 | 2024-12-06 10時23分 (1 年前) |
|---|
| 管理 | 2024-12-08 21時40分 (2 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 287277 [WeiYe-Jing datax-web 2.1.1 /api/job/add/ glueSource 权限提升] |
|---|
| 积分 | 20 |
|---|