A vulnerability was found in Home Clean Services Management System 1.0. It has been rated as critical. Affected by this issue is register.php?link=registerand. The manipulation with the input <?php phpinfo();?> leads to code execution. The attack may be launched remotely but demands an authentication. Exploit details have been disclosed to the public.
References
Link | Resource |
---|---|
https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_add_register.php_File_Upload_Getshell.md | Exploit Third Party Advisory |
https://vuldb.com/?id.200582 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-05-23 23:15
Updated : 2022-06-02 12:44
NVD link : CVE-2022-1837
Mitre link : CVE-2022-1837
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
home_clean_services_management_system_project
- home_clean_services_management_system