# N/A
## 漏洞概述
angular-base64-upload 版本低于 v0.1.21 存在未认证的远程代码执行漏洞,通过 demo/server.php 可利用此漏洞。攻击者可上传任意内容到服务器,并通过 demo/uploads 访问这些内容,进一步执行已上传的内容以实现服务器上的代码执行。
## 影响版本
v0.1.21 之前的版本
## 漏洞细节
攻击者可以通过 demo/server.php 上传任意内容到服务器。上传的内容可以通过 demo/uploads 路径访问,并能够被执行,从而实现对服务器的代码执行。
## 影响
此漏洞仅影响不再受维护者支持的产品。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Unauthenticated Remote Code Execution via Angular-Base64-Upload Library | https://github.com/rvizx/CVE-2024-42640 | POC详情 |
2 | Unauthenticated Remote Code Execution via Angular-Base64-Upload Library (npm:bower) | https://github.com/KTN1990/CVE-2024-42640 | POC详情 |
3 | angular-base64-upload prior to v0.1.21 is vulnerable to unauthenticated remote code execution via demo/server.php. Exploiting this vulnerability allows an attacker to upload arbitrary content to the server, which can subsequently be accessed through demo/uploads. This leads to the execution of previously uploaded content and enables the attacker to achieve code execution on the server. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-42640.yaml | POC详情 |
标题: GitHub - adonespitogo/angular-base64-upload: Converts files from file input into base64 encoded models. -- 🔗来源链接
标签:
标题: zyenra -- 🔗来源链接
标签:
暂无评论