A vulnerability, which was classified as critical, has been found in dst-admin 1.5.0. Affected by this issue is some unknown functionality of the file /home/kickPlayer. The manipulation of the argument userId leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-220034 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/Ha0Liu/cveAdd/blob/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0kickPlayer%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/Dst-admin%201.5.0%20background%20kickPlayer%20interface%20remote%20command%20execution.md | Exploit Third Party Advisory |
https://vuldb.com/?id.220034 | Third Party Advisory |
https://vuldb.com/?ctiid.220034 | Third Party Advisory |
Configurations
Information
Published : 2023-02-02 07:17
Updated : 2023-02-09 11:33
NVD link : CVE-2023-0647
Mitre link : CVE-2023-0647
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
dst-admin_project
- dst-admin