Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-26119 PoC — Simon Wisselink Smarty 安全漏洞

Source
Associated Vulnerability
Title:Simon Wisselink Smarty 安全漏洞 (CVE-2021-26119)
Description:Simon Wisselink Smarty是荷兰Simon Wisselink社区的一个应用程序。提供了一种易于管理的方式,可以将应用程序逻辑和内容与其表示形式分开。 Smarty before 3.1.39 存在安全漏洞,该漏洞允许沙箱转义,因为$smarty.template_object可以在沙箱模式下访问。
Readme
# CVE-2021-26119

<code>https://beta.shodan.io/search?query=http.html%3A%22tiki-login.php%22</code>
<img src="https://i.imgur.com/ntq8cUi.jpg"></img>
File Snapshot

[4.0K] /data/pocs/2c3aff1235ea65ddafed7cd507003ab248e1b624 ├── [5.8K] poc.py └── [ 150] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.