In PESCMS Team 2.2.1, attackers may upload and execute arbitrary PHP code through /Public/?g=Team&m=Setting&a=upgrade by placing a .php file in a ZIP archive.# CVE-2018-16370
In PESCMS Team 2.2.1, attackers may upload and execute arbitrary PHP code through /Public/?g=Team&m=Setting&a=upgrade by placing a .php file in a ZIP archive.More details see (https://github.com/lazyphp/PESCMS-TEAM/issues/2)
[4.0K] /data/pocs/331ba76906403d4af0a4f08f18f2e3a44cfd31df
└── [ 251] README.md
0 directories, 1 file