PayMoney 3.3 is vulnerable to Client Side Remote Code Execution (RCE). The vulnerability exists on the reply ticket function and upload the malicious file. A calculator will open when the victim who download the file open the RTF file.
References
Link | Resource |
---|---|
https://github.com/saitamang/POC-DUMP/tree/main/PayMoney | Exploit Third Party Advisory |
https://paymoney.techvill.org | Vendor Advisory |
https://github.com/saitamang/POC-DUMP/tree/main/PayMoney | Exploit Third Party Advisory |
https://paymoney.techvill.org | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/saitamang/POC-DUMP/tree/main/PayMoney - Exploit, Third Party Advisory | |
References | () https://paymoney.techvill.org - Vendor Advisory |
Information
Published : 2022-09-14 11:15
Updated : 2024-11-21 07:14
NVD link : CVE-2022-37140
Mitre link : CVE-2022-37140
CVE.ORG link : CVE-2022-37140
JSON object : View
Products Affected
techvill
- paymoney
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type