A remote code execution (RCE) vulnerability in Subconverter v0.7.2 allows attackers to execute arbitrary code via crafted config and url parameters.
References
Link | Resource |
---|---|
https://gist.github.com/CwithW/01a726e5af709655d6ee0b2067cdae03 | Exploit Patch Third Party Advisory |
https://github.com/tindy2013/subconverter/commit/ce8d2bd0f13f05fcbd2ed90755d097f402393dd3 | Patch Third Party Advisory |
https://gist.github.com/CwithW/01a726e5af709655d6ee0b2067cdae03 | Exploit Patch Third Party Advisory |
https://github.com/tindy2013/subconverter/commit/ce8d2bd0f13f05fcbd2ed90755d097f402393dd3 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/CwithW/01a726e5af709655d6ee0b2067cdae03 - Exploit, Patch, Third Party Advisory | |
References | () https://github.com/tindy2013/subconverter/commit/ce8d2bd0f13f05fcbd2ed90755d097f402393dd3 - Patch, Third Party Advisory |
Information
Published : 2022-05-19 16:15
Updated : 2024-11-21 06:58
NVD link : CVE-2022-28927
Mitre link : CVE-2022-28927
CVE.ORG link : CVE-2022-28927
JSON object : View
Products Affected
subconverter_project
- subconverter
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type