POC详情: b412c732201468e134a18e505294959767a4663e

来源
关联漏洞
标题: Zenario CMS 安全漏洞 (CVE-2022-44136)
描述:Zenario CMS是Zenario开源的一个应用软件。提供一个基于Web的内容管理系统。 Zenario CMS 9.3.57186版本存在安全漏洞,该漏洞源于攻击者可以实现远程代码执行。
描述
Zenar CMS 9.3 suffers from an ​​unrestricted file upload vulnerability​​ in its file management module, allowing authenticated attackers (with minimal privileges) to upload arbitrary files, including malicious PHP scripts, to the web server. 
介绍
# CVE-2022-44136-poc
Zenar CMS 9.3 suffers from an ​​unrestricted file upload vulnerability​​ in its file management module, allowing authenticated attackers (with minimal privileges) to upload arbitrary files, including malicious PHP scripts, to the web server. Due to insufficient file extension validation and improper sanitization, an attacker can execute arbitrary code on the target system by uploading a crafted payload (e.g., a web shell) and accessing it via the web root.
文件快照

[4.0K] /data/pocs/b412c732201468e134a18e505294959767a4663e ├── [5.0K] CVE-2022-44136-EXP.py └── [ 490] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。