Goby/json/eGroupWare-spellchecker.php...

41 lines
1.4 KiB
JSON

{
"Name": "eGroupWare spellchecker.php RCE",
"Description": "Egroupware is a multi-user, web-based workpieces suite developed on the basis of customized set of PHP based API. There is a remote command execution vulnerability in spellchecker.php file of egroupware system, which allows attackers to execute arbitrary system commands on vulnerable systems.",
"Product": "eGroupWare",
"Homepage": "http://www.egroupware.org/",
"DisclosureDate": "2021-05-29",
"Author": "sharecast.net@gmail.com",
"GobyQuery": "app=\"eGroupWare\"",
"Level": "3",
"Impact": "<p>Hackers can execute any command on the server and write the back door, so as to invade the server and obtain the administrator authority of the server.<br></p>",
"Recommendation": "<p>Strictly filter the data input by users and prohibit the execution of system commands.<br></p>",
"References": [
"https://github.com/Ret2LC/BetterSploit/blob/e8d1d5f8a41508c2b376c84cb57dbe61f48f38a4/BetterSploit/exploitz/exploitz/eGroupWare-1.14-spellchecker-RCE.py"
],
"HasExp": true,
"ExpParams": [
{
"name": "cmd",
"type": "input",
"value": "id"
}
],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": null,
"ExploitSteps": null,
"Tags": [
"RCE"
],
"CVEIDs": null,
"CVSSScore": "0.0",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}