Tag
#auth
This Metasploit exploit module leverages an improperly controlled modification of dynamically-determined object attributes vulnerability (CVE-2023-43177) to achieve unauthenticated remote code execution. This affects CrushFTP versions prior to 10.5.1. It is possible to set some user's session properties by sending an HTTP request with specially crafted Header key-value pairs. This enables an unauthenticated attacker to access files anywhere on the server file system and steal the session cookies of valid authenticated users. The attack consists in hijacking a user's session and escalates privileges to obtain full control of the target. Remote code execution is obtained by abusing the dynamic SQL driver loading and configuration testing feature.
WordPress WP Video Playlist plugin version 1.1.1 suffers from a persistent cross site scripting vulnerability.
Handala threat group claims to have hacked radar systems in Israel as tensions rise between the two nations.
BMC Compuware iStrobe Web version 20.13 suffers from a remote shell upload vulnerability.
Kruxton version 1.0 suffers from a remote SQL injection vulnerability.
Kruxton version 1.0 suffers from a remote shell upload vulnerability.
WBCE version 1.6.0 suffers from a remote SQL injection vulnerability.
AMPLE BILLS version 0.1 suffers from a remote SQL injection vulnerability.
PrusaSlicer versions 2.6.1 and below suffer from an arbitrary code execution vulnerability.
Moodle version 3.10.1 suffers from a remote time-based SQL injection vulnerability.