A Remote Command Execution vulnerability on the background in zrlog 2.2.2, at the upload avatar function, could bypass the original limit, upload the JSP file to get a WebShell
References
Link | Resource |
---|---|
https://github.com/94fzb/zrlog/issues/115 | Exploit Issue Tracking Third Party Advisory |
Configurations
Information
Published : 2021-11-28 13:15
Updated : 2021-11-29 06:33
NVD link : CVE-2021-44093
Mitre link : CVE-2021-44093
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
zrlog
- zrlog