A Remote Command Execution vulnerability on the background in zrlog 2.2.2, at the upload avatar function, could bypass the original limit, upload the JSP file to get a WebShell
References
Link | Resource |
---|---|
https://github.com/94fzb/zrlog/issues/115 | Exploit Issue Tracking Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-11-28T20:27:43
Updated: 2021-11-28T20:27:43
Reserved: 2021-11-22T00:00:00
Link: CVE-2021-44093
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-11-28T21:15:08.140
Modified: 2021-11-29T14:33:04.467
Link: CVE-2021-44093
JSON object: View
Redhat Information
No data.
CWE