Files
CVEs-PoC/2021/CVE-2021-23262.md
T
2024-05-25 21:48:12 +02:00

21 lines
821 B
Markdown

### [CVE-2021-23262](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23262)
![](https://img.shields.io/static/v1?label=Product&message=Crafter%20CMS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.1%3C%203.1.13%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources&color=brighgreen)
### Description
Authenticated administrators may modify the main YAML configuration file and load a Java class resulting in RCE.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Hax0rG1rl/my_cve_and_bounty_poc
- https://github.com/happyhacking-k/happyhacking-k
- https://github.com/happyhacking-k/my_cve_and_bounty_poc