mirror of
https://github.com/0xMarcio/cve.git
synced 2026-03-07 04:00:48 +00:00
1.2 KiB
1.2 KiB
CVE-2011-10019
Description
Spreecommerce versions prior to 0.60.2 contains a remote command execution vulnerability in its search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Ruby’s send method. This allows attackers to execute arbitrary shell commands on the server without authentication.
POC
Reference
- https://www.exploit-db.com/exploits/17941
- https://www.vulncheck.com/advisories/spreecommerce-search-parameter-rce
Github
No PoCs found on GitHub currently.