OS Command Injection in export.php (vulnerable function called from include/functions-article.php) in Chadha PHPKB Standard Multi-Language 9 allows remote attackers to achieve Code Execution by saving the code to be executed as the wkhtmltopdf path via admin/save-settings.php.
References
Link | Resource |
---|---|
http://antoniocannito.it/?p=137#rce3 | Exploit Third Party Advisory |
https://antoniocannito.it/phpkb1#out-of-band-blind-authenticated-remote-code-execution-cve-2020-10390 | Exploit Third Party Advisory |
http://antoniocannito.it/?p=137#rce3 | Exploit Third Party Advisory |
https://antoniocannito.it/phpkb1#out-of-band-blind-authenticated-remote-code-execution-cve-2020-10390 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://antoniocannito.it/?p=137#rce3 - Exploit, Third Party Advisory | |
References | () https://antoniocannito.it/phpkb1#out-of-band-blind-authenticated-remote-code-execution-cve-2020-10390 - Exploit, Third Party Advisory |
Information
Published : 2020-03-12 14:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10390
Mitre link : CVE-2020-10390
CVE.ORG link : CVE-2020-10390
JSON object : View
Products Affected
chadhaajay
- phpkb
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')