A vulnerability was found in Home Clean Services Management System 1.0. It has been rated as critical. Affected by this issue is register.php?link=registerand. The manipulation with the input <?php phpinfo();?> leads to code execution. The attack may be launched remotely but demands an authentication. Exploit details have been disclosed to the public.
References
Link | Resource |
---|---|
https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_add_register.php_File_Upload_Getshell.md | Exploit Third Party Advisory |
https://vuldb.com/?id.200582 | Third Party Advisory |
https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_add_register.php_File_Upload_Getshell.md | Exploit Third Party Advisory |
https://vuldb.com/?id.200582 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_add_register.php_File_Upload_Getshell.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?id.200582 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 4.7 |
Information
Published : 2022-05-24 06:15
Updated : 2024-11-21 06:41
NVD link : CVE-2022-1837
Mitre link : CVE-2022-1837
CVE.ORG link : CVE-2022-1837
JSON object : View
Products Affected
home_clean_services_management_system_project
- home_clean_services_management_system
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type