Usermin version 1.820 is vulnerable to a Remote Code Execution (RCE) attack when an authenticated user is able to inject malicious code into the GnuPG setup page. This code is then executed when the user logs in. An attacker can use this vulnerability to gain access to the system and execute arbitrary code.
ZesleCP 3.1.9 is vulnerable to Remote Code Execution (RCE) when an authenticated user sends a malicious payload to the /json-api/cpanel endpoint. The payload creates a FTP account with a malicious command that is executed when the FTP account is created. This allows an attacker to execute arbitrary code on the server.
The vulnerability is caused due to a boundary error in the processing of user input, which can be exploited to cause a buffer overflow when a user inserts overly long array of string bytes through several functions. Successful exploitation could allow execution of arbitrary code on the affected node.
CyberPanel is vulnerable to authenticated Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability by sending a malicious payload to the target server. This payload will execute arbitrary code on the target server.
ProcessMaker 3.5.4 is vulnerable to Local File Inclusion. An attacker can use curl to send a malicious request to the target server and read the content of the file. The attacker can also use Jaeles Scanner to scan the target server for this vulnerability.
This exploit allows an unauthenticated attacker to upload a malicious file to the target system. The malicious file contains a reverse shell payload which can be used to gain access to the target system. The exploit is tested on Linux.
A stored cross-site scripting (XSS) vulnerability exists in HP OfficeJet 4630/7110 MYM1FN2025AR 2117A. An attacker can exploit this vulnerability by sending a malicious payload to the vulnerable device via a PUT request. The payload is then stored in the device's configuration file, which is accessible via a GET request. This allows an attacker to execute arbitrary JavaScript code in the context of the vulnerable device.
WordPress Plugin Mail Masta is prone to a local file inclusion vulnerability because it fails to sufficiently verify user-supplied input.
A vulnerability in RaspAP 2.6.6 allows an authenticated user to execute arbitrary code on the target system. This is achieved by sending a malicious payload to the /wpa_conf endpoint, which is then executed by the system. The payload is sent using a POST request with the user's credentials, and the malicious code is stored in the 'connect' parameter.
Using the username ' or sleep(5)='-- -' and a blank password to login will have the webapp sleep for 5 seconds, then the user will be logged in as ' or sleep(5)='-- -'.