CVE-2021-39503

PHPMyWind 5.6 is vulnerable to Remote Code Execution. Becase input is filtered without "<, >, ?, =, `,...." In WriteConfig() function, an attacker can inject php code to /include/config.cache.php file.
References
Link Resource
https://github.com/KietNA-HPT/CVE Exploit Third Party Advisory
https://github.com/gaozhifeng/PHPMyWind/issues/15 Exploit Third Party Advisory
https://github.com/KietNA-HPT/CVE Exploit Third Party Advisory
https://github.com/gaozhifeng/PHPMyWind/issues/15 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpmywind:phpmywind:5.6:*:*:*:*:*:*:*

History

21 Nov 2024, 06:19

Type Values Removed Values Added
References () https://github.com/KietNA-HPT/CVE - Exploit, Third Party Advisory () https://github.com/KietNA-HPT/CVE - Exploit, Third Party Advisory
References () https://github.com/gaozhifeng/PHPMyWind/issues/15 - Exploit, Third Party Advisory () https://github.com/gaozhifeng/PHPMyWind/issues/15 - Exploit, Third Party Advisory

Information

Published : 2021-09-07 20:15

Updated : 2024-11-21 06:19


NVD link : CVE-2021-39503

Mitre link : CVE-2021-39503

CVE.ORG link : CVE-2021-39503


JSON object : View

Products Affected

phpmywind

  • phpmywind
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')