SPIP 4.2.12 Remote Code Execution...

- AV AC AU C I A
发布: 2024-08-22
修订: 2024-12-11

This Metasploit module exploits a remote code execution vulnerability in SPIP versions up to and including 4.2.12. The vulnerability occurs in SPIP's templating system where it incorrectly handles user-supplied input, allowing an attacker to inject and execute arbitrary PHP code. This can be achieved by crafting a payload manipulating the templating data processed by the echappe_retour() function, invoking traitements_previsu_php_modeles_eval(), which contains an eval() call.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息