漏洞标题
WeGIA中'gerenciar_backup.php'接口'file'参数存在OS命令注入漏洞(远程代码执行)
漏洞描述信息
WeGIA 是一个开源的Web管理系统,主要面向葡萄牙语用户。在WeGIA应用程序的 `gerenciar_backup.php` 终端点中发现了一个操作系统命令注入漏洞。该漏洞可能允许攻击者远程执行任意代码。此问题已在版本3.2.14中得到解决,建议所有用户进行升级。目前,此漏洞没有已知的解决方法。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
漏洞类别
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
漏洞标题
OS Command Injection endpoint 'gerenciar_backup.php' parameter 'file' (RCE) in WeGIA
漏洞描述信息
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. An OS Command Injection vulnerability was discovered in the WeGIA application, `gerenciar_backup.php` endpoint. This vulnerability could allow an attacker to execute arbitrary code remotely. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS信息
N/A
漏洞类别
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)