vendor:
RSSonate
by:
Kw3[R]Ln
9,8
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: RSSonate
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020
RSSonate remote Command Execution Vulnerabilities
The RSSonate application is vulnerable to remote command execution. An attacker can exploit this vulnerability by sending a maliciously crafted request to the vulnerable application. The vulnerable parameters are PROJECT_ROOT in xml2rss.php, config_local.php, rssonate.php, sql2xml.php, and xml2rss.php. The attacker can inject arbitrary commands into the vulnerable parameters and execute them on the server.
Mitigation:
The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of RSSonate.