Remote Code Execution can occur in Simple Water Refilling Station Management System 1.0 via the System Logo option on the system_info page in classes/SystemSettings.php with an update_settings action.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/50205 | Exploit Third Party Advisory VDB Entry |
https://www.sourcecodester.com/php/14906/simple-water-refilling-station-management-system-php-free-source-code.html | Product Third Party Advisory |
https://www.sourcecodester.com/users/tips23 | Third Party Advisory |
https://www.exploit-db.com/exploits/50205 | Exploit Third Party Advisory VDB Entry |
https://www.sourcecodester.com/php/14906/simple-water-refilling-station-management-system-php-free-source-code.html | Product Third Party Advisory |
https://www.sourcecodester.com/users/tips23 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.exploit-db.com/exploits/50205 - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.sourcecodester.com/php/14906/simple-water-refilling-station-management-system-php-free-source-code.html - Product, Third Party Advisory | |
References | () https://www.sourcecodester.com/users/tips23 - Third Party Advisory |
Information
Published : 2021-09-07 06:15
Updated : 2024-11-21 06:18
NVD link : CVE-2021-38841
Mitre link : CVE-2021-38841
CVE.ORG link : CVE-2021-38841
JSON object : View
Products Affected
simple_water_refilling_station_management_system_project
- simple_water_refilling_station_management_system
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type