# N/A
## 概述
在Pluck-CMS v4.7.18版本的组件/inc/modules_install.php中存在任意文件上传漏洞,攻击者可以通过上传恶意构造的ZIP文件来执行任意代码。
## 影响版本
- Pluck-CMS v4.7.18
## 细节
攻击者可以利用组件/inc/modules_install.php的漏洞上传一个精心构造的ZIP文件,从而在系统中执行任意代码。
## 影响
此漏洞允许远程攻击者在受影响的系统中执行任意代码,可能导致系统被完全控制,带来严重的安全风险。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | None | https://github.com/Rai2en/CVE-2023-50564_Pluck-v4.7.18_PoC | POC详情 |
2 | CVE-2023-50564 PoC | https://github.com/ipuig/CVE-2023-50564 | POC详情 |
3 | Python Script to exploit CVE-2023-50564 | https://github.com/rwexecute/CVE-2023-50564 | POC详情 |
4 | CVE-2023-50564 - An arbitrary file upload vulnerability in the component /inc/modules_install.php of Pluck-CMS v4.7.18 allows attackers to execute arbitrary code via uploading a crafted ZIP file. | https://github.com/thefizzyfish/CVE-2023-50564-pluck | POC详情 |
5 | None | https://github.com/Mrterrestrial/CVE-2023-50564 | POC详情 |
6 | Refurbish exploit in bash | https://github.com/TanveerS1ngh/Pluck-CMS-v4.7.18-Remote-Code-Execution-CVE-2023-50564- | POC详情 |
7 | Refurbish exploit in bash | https://github.com/TanveerS1ngh/Pluck-CMS-v4.7.18-Remote-Code-Execution-CVE-2023-50564 | POC详情 |
8 | Refurbish exploit in bash | https://github.com/0xDTC/Pluck-CMS-v4.7.18-Remote-Code-Execution-CVE-2023-50564 | POC详情 |
9 | Pluck-CMS v4.7.18 RCE exploit | https://github.com/xpltive/CVE-2023-50564 | POC详情 |
10 | Pluck v4.7.18 - Remote Code Execution (RCE) | https://github.com/glynzr/CVE-2023-50564 | POC详情 |