目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2023-41425 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
WonderCMS 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
WonderCMS是一套基于PHP的开源内容管理系统(CMS)。 WonderCMS v.3.2.0版本至v.3.4.2版本存在安全漏洞。攻击者利用该漏洞通过上传到installModule组件的特制脚本执行任意代码。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
-n/a n/a -
二、漏洞 CVE-2023-41425 的公开POC
#POC 描述源链接神龙链接
1WonderCMS Authenticated RCE - CVE-2023-41425https://github.com/prodigiousMind/CVE-2023-41425POC详情
2Wonder CMS RCE (XSS)https://github.com/charlesgargasson/CVE-2023-41425POC详情
3WonderCMS RCE CVE-2023-41425https://github.com/insomnia-jacob/CVE-2023-41425POC详情
4Researchhttps://github.com/tiyeume25112004/CVE-2023-41425POC详情
5Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.https://github.com/thefizzyfish/CVE-2023-41425-wonderCMS_RCEPOC详情
6Nonehttps://github.com/Raffli-Dev/CVE-2023-41425POC详情
7CVE-2023-41425 (Wonder CMS XSS to RCE) exploit which serves required scripts locally. Good if you're lost at sea and have found a problem with your bike.https://github.com/duck-sec/CVE-2023-41425POC详情
8CVE-2023-41425 Refurbishhttps://github.com/TanveerS1ngh/WonderCMS-4.3.2-XSS-to-RCE-Exploits-CVE-2023-41425POC详情
9Writing one because the one I found isn't workinghttps://github.com/h3athen/CVE-2023-41425POC详情
10CVE-2023-41425 Refurbishhttps://github.com/0xDTC/WonderCMS-4.3.2-XSS-to-RCE-Exploits-CVE-2023-41425POC详情
11Xss injection, WonderCMS 3.2.0 -3.4.2 https://github.com/Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCEPOC详情
12CVE-2023-41425 (XSS to RCE, Wonder CMS 3.2.0 <= 3.4.2)https://github.com/0x0d3ad/CVE-2023-41425POC详情
13Researchhttps://github.com/SpycioKon/CVE-2023-41425POC详情
14Wonder CMS v3.2.0 - v3.4.2 XSS to RCE exploithttps://github.com/xpltive/CVE-2023-41425POC详情
15Nonehttps://github.com/samu21req/CVE-2023-41425POC详情
16Nonehttps://github.com/KGorbakon/CVE-2023-41425POC详情
17WonderCMS RCE CVE-2023-41425https://github.com/Twappz/CVE-2023-41425POC详情
18WonderCMS v3.4.2 NSE Discovery Scripthttps://github.com/becrevex/CVE-2023-41425POC详情
19Automates creation and hosting of a JavaScript XSS payload to install a malicious theme module, triggering a reverse shell via Remote Code Execution in WonderCMS. This tool uses PentestMonkey's PHP reverse shell script as the payloadhttps://github.com/Tea-On/CVE-2023-41425-RCE-WonderCMS-4.3.2POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2023-41425 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-41425

暂无评论


发表评论