Dangerous method exposed which can lead to RCE in qmpass/leadshop v1.4.15 allows an attacker to control the target host by calling any function in leadshop.php via the GET method.
References
Link | Resource |
---|---|
https://github.com/qmpaas/leadshop/commit/f27e9ca5c93eaadda1097396b65c234b16186d67 | Patch Third Party Advisory |
https://huntr.dev/bounties/fe418ae1-7c80-4d91-8a5a-923d60ba78c3 | Exploit Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: @huntrdev
Published: 2022-11-24T00:00:00
Updated: 2022-11-24T00:00:00
Reserved: 2022-11-24T00:00:00
Link: CVE-2022-4136
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-11-24T08:15:09.173
Modified: 2022-11-30T19:52:49.420
Link: CVE-2022-4136
JSON object: View
Redhat Information
No data.
CWE