vendor:
Slooze
by:
Sn!pEr.S!Te hacker
9,3
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: Slooze
Affected Version From: 0.2.7
Affected Version To: 0.2.7
Patch Exists: YES
Related CWE: N/A
CPE: a:slooze:slooze:0.2.7
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010
slooze.php Command Execution Vulnerability
A vulnerability exists in slooze.php, which allows an attacker to execute arbitrary commands on the vulnerable system. The vulnerability is due to insufficient sanitization of user-supplied input to the 'file' parameter. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable system. Successful exploitation of this vulnerability can result in arbitrary code execution on the vulnerable system.
Mitigation:
The vendor has released a patch to address this vulnerability. Users are advised to apply the patch as soon as possible.