# Sawtooth Software Lighthouse Studio 9.16.14之前版本未认证远程代码执行漏洞
## 概述
Sawtooth Software的Lighthouse Studio版本在9.16.14之前的版本中存在模板注入漏洞。该漏洞通过ciwweb.pl Perl Web应用程序暴露。
## 影响版本
- Lighthouse Studio 版本 < 9.16.14
## 细节
通过ciwweb.pl Perl Web应用程序,攻击者可以利用模板注入漏洞执行任意命令。该漏洞允许未认证的攻击者执行任意命令。
## 影响
- 未认证的攻击者可以执行任意命令。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | A pre-authentication remote code execution vulnerability exists in Sawtooth Software’s Lighthouse Studio versions prior to 9.16.14. The issue arises from the unsafe use of the `eval` function within the Perl CGI component `ciwweb.pl`, where attacker-supplied input inside `hid_Random_ACARAT` is directly passed to `eval`. This allows remote unauthenticated attackers to execute arbitrary Perl code on the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-34300.yaml | POC详情 |
标题: RCE in the Most Popular Survey Software You’ve Never Heard Of › Searchlight Cyber -- 🔗来源链接
标签: technical-description
神龙速读暂无评论