Tag
#php
MagnusBilling version 6.x suffers from a PHP code injection vulnerability.
Kafka UI version 0.7.1 suffers from a remote code injection vulnerability.
GL.iNet version 4.4.3 suffers from authentication bypass and code injection vulnerabilities.
Gibbon School Platform version 26.0.00 suffers from a PHP code injection vulnerability.
Craft CMS version 4.4.14 suffers from a PHP code injection vulnerability.
Chamilo version 1.11.18 suffers from a PHP code injection vulnerability.
Artica Proxy version 4.40 suffers from a code injection vulnerability that provides a reverse shell.
The ABB BMS/BAS controller suffers from an authenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the 'MODEM' HTTP POST parameter called by the dialupSwitch.php script.
The BMS/BAS controller suffers from a vulnerability that allows an unauthenticated attacker to enable or disable the SSH daemon by sending a POST request to sshUpdate.php with a simple JSON payload. This can be exploited to start the SSH service on the remote host without proper authentication, potentially enabling unauthorized access or stop and deny service access.
The BMS/BAS controller has a directory traversal vulnerability that can be exploited by an unauthenticated attacker to list the contents of arbitrary directories without reading file contents, leading to information disclosure of directory structures and filenames. This may expose sensitive system details, aiding in further attacks. The issue lies in the listFiles() function of the persistenceManagerAjax.php script, which calls PHP's readdir() function without proper input validation of the 'directory' POST parameter.