# N/A
## 漏洞概述
GetSimple CMS 版本 3.3.16 中存在远程代码执行(RCE)漏洞,该漏洞通过 `admin/theme-edit.php` 文件中的 `edited_file` 参数触发。
## 影响版本
- GetSimple CMS 3.3.16
## 漏洞细节
漏洞位于 `admin/theme-edit.php` 文件的 `edited_file` 参数,攻击者可以通过该参数注入恶意代码并实现远程代码执行。
## 漏洞影响
成功利用此漏洞可使攻击者在目标服务器上执行任意代码,从而导致服务器完全被掌控,包括但不限于数据泄露、服务器被植入恶意软件等严重后果。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Exploit script for CVE-2022-41544 - RCE in get-simple CMS | https://github.com/yosef0x01/CVE-2022-41544 | POC详情 |
2 | Exploit script for CVE-2022-41544 in GetSimple CMS, with enhanced error handling and detailed usage instructions. | https://github.com/Sp3c73rSh4d0w/CVE-2022-41544 | POC详情 |
3 | Exploit script for CVE-2022-41544 in GetSimple CMS, with enhanced error handling and detailed usage instructions. | https://github.com/0xwh1pl4sh/CVE-2022-41544 | POC详情 |
4 | Exploit script for CVE-2022-41544 in GetSimple CMS, with enhanced error handling and detailed usage instructions. | https://github.com/N3rdyN3xus/CVE-2022-41544 | POC详情 |
5 | Exploit script for CVE-2022-41544 in GetSimple CMS, with enhanced error handling and detailed usage instructions. | https://github.com/NyxByt3/CVE-2022-41544 | POC详情 |
6 | Exploit script for CVE-2022-41544 in GetSimple CMS, with enhanced error handling and detailed usage instructions. | https://github.com/h3xcr4ck3r/CVE-2022-41544 | POC详情 |
7 | Exploit script for CVE-2022-41544 in GetSimple CMS, with enhanced error handling and detailed usage instructions. | https://github.com/n3rdh4x0r/CVE-2022-41544 | POC详情 |
8 | Exploit script for CVE-2022-41544 in GetSimple CMS, with enhanced error handling and detailed usage instructions. | https://github.com/h3x0v3rl0rd/CVE-2022-41544 | POC详情 |
暂无评论