Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-43778 PoC — GLPI 路径遍历漏洞

Source
Associated Vulnerability
Title:GLPI 路径遍历漏洞 (CVE-2021-43778)
Description:GLPI是个人开发者的一款开源IT和资产管理软件。该软件提供功能全面的IT资源管理接口,你可以用它来建立数据库全面管理IT的电脑,显示器,服务器,打印机,网络设备,电话,甚至硒鼓和墨盒等。 GLPI 存在路径遍历漏洞,该漏洞源于条形码是一个GLPI插件,用于打印条形码和二维码。GLPI实例版本2。安装了条码插件的版本2.6.1之前的X容易出现路径遍历的漏洞。此问题在2.6.1版本修复。作为一个解决方法,删除 front send.php文件。
Description
 CVE-2021-43778 poc
Readme
# CVE-2021-43778
CVE-2021-43778 poc

usage: CVE-2021-43778 http://test.com
File Snapshot

[4.0K] /data/pocs/c0f7ad515e0ded2543adc537452e7312cb5f97e4 ├── [ 444] CVE-2021-43778.py └── [ 75] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.