vendor:
Sentrifugo
by:
Fatih Çelik
7.5
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: Sentrifugo
Affected Version From: 3.2
Affected Version To: 3.2
Patch Exists: NO
Related CWE: N/A
CPE: a:sentrifugo:sentrifugo:3.2
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Kali Linux 2020.2
2020
Sentrifugo Version 3.2 – ‘announcements’ Remote Code Execution (Authenticated)
Sentrifugo version 3.2 is vulnerable to authenticated remote code execution. An attacker can upload a malicious PHP file to the application and trigger it to get a reverse shell. The attacker needs to have valid credentials to exploit this vulnerability.
Mitigation:
Ensure that the application is running the latest version of Sentrifugo and that all users have strong passwords.