提交 #516293: www.digiwin.com digiwin ERP system v5.0.1 Improper Sanitization of Filename to result信息

标题www.digiwin.com digiwin ERP system v5.0.1 Improper Sanitization of Filename to result
描述A file upload vulnerability has been discovered in the Digiwin ERP system that does not require authentication. This flaw permits attackers to upload arbitrary files, including potentially harmful ASPX files, which can result in remote code execution and total server compromise.
来源⚠️ https://github.com/Rain1er/report/blob/main/THNlcnBf/RCE_5.md
用户
 XU NIE (UID 82414)
提交2025-03-07 16時35分 (1 年前)
管理2025-03-24 12時19分 (17 days later)
状态已接受
VulDB条目300727 [Digiwin ERP 5.0.1 UploadAjaxAPI.ashx 文件 权限提升]
积分17

Want to stay up to date on a daily basis?

Enable the mail alert feature now!