漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
ProcessMaker Open Source < 2.5.2 neoclassic Skin PHP Code Execution
漏洞信息
A code injection vulnerability exists in ProcessMaker Open Source versions 2.x when using the default 'neoclassic' skin. An authenticated user can execute arbitrary PHP code via multiple endpoints, including appFolderAjax.php, casesStartPage_Ajax.php, and cases_SchedulerGetPlugins.php, by supplying crafted POST requests to parameters such as action and params. These endpoints fail to validate user input and directly invoke PHP functions like system() with user-supplied parameters, enabling remote code execution. The vulnerability affects both Linux and Windows installations and is present in default configurations of versions including 2.0.23 through 2.5.1. The vulnerable skin cannot be removed through the web interface, and exploitation requires only valid user credentials.
漏洞信息
N/A
漏洞
对生成代码的控制不恰当(代码注入)
漏洞
ProcessMaker Open Source 安全漏洞
漏洞信息
ProcessMaker Open Source是美国ProcessMaker公司的一个工作流管理软件。 ProcessMaker Open Source 2.0.23至2.5.1版本存在安全漏洞,该漏洞源于多个端点未验证用户输入,可能导致远程代码执行。
漏洞信息
N/A
漏洞
N/A