An issue was discovered in SmartFoxServer 2.17.0. An attacker can execute arbitrary Python code, and bypass the javashell.py protection mechanism, by creating /config/ConsoleModuleUnlock.txt and editing /config/admin/admintool.xml to enable the Console module.
References
Link | Resource |
---|---|
https://www.smartfoxserver.com | Product |
http://packetstormsecurity.com/files/161340/SmartFoxServer-2X-2.17.0-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://www.zeroscience.mk/en/vulnerabilities/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-02-09 12:15
Updated : 2021-02-18 06:08
NVD link : CVE-2021-26551
Mitre link : CVE-2021-26551
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
smartfoxserver
- smartfoxserver