liquidsky (JMcPeters)

10 exploits Active since May 2019
CVE-2019-18873 NOMISEC CRITICAL WORKING POC
FUDForum 3.0.9 - Stored XSS
FUDForum 3.0.9 is vulnerable to Stored XSS via the User-Agent HTTP header. This may result in remote code execution. An attacker can use a user account to fully compromise the system via a GET request. When the admin visits user information under "User Manager" in the control panel, the payload will execute. This will allow for PHP files to be written to the web root, and for code to execute on the remote server. The problem is in admsession.php and admuser.php.
7 stars
CVSS 9.0
CVE-2019-12169 NOMISEC HIGH WORKING POC
ATutor 2.2.4 - RCE
ATutor 2.2.4 allows Arbitrary File Upload and Directory Traversal, resulting in remote code execution via a ".." pathname in a ZIP archive to the mods/_core/languages/language_import.php (aka Import New Language) or mods/_standard/patcher/index_admin.php (aka Patcher) component.
3 stars
CVSS 8.8
CVE-2019-18839 GITLAB CRITICAL WORKING POC
FUDForum 3.0.9 - XSS
FUDForum 3.0.9 is vulnerable to Stored XSS via the nlogin parameter. This may result in remote code execution. An attacker can use a user account to fully compromise the system using a POST request. When the admin visits the user information, the payload will execute. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.
CVSS 9.0
CVE-2019-18873 GITLAB CRITICAL WORKING POC
FUDForum 3.0.9 - Stored XSS
FUDForum 3.0.9 is vulnerable to Stored XSS via the User-Agent HTTP header. This may result in remote code execution. An attacker can use a user account to fully compromise the system via a GET request. When the admin visits user information under "User Manager" in the control panel, the payload will execute. This will allow for PHP files to be written to the web root, and for code to execute on the remote server. The problem is in admsession.php and admuser.php.
CVSS 9.0
CVE-2019-12169 GITLAB HIGH WORKING POC
ATutor 2.2.4 - RCE
ATutor 2.2.4 allows Arbitrary File Upload and Directory Traversal, resulting in remote code execution via a ".." pathname in a ZIP archive to the mods/_core/languages/language_import.php (aka Import New Language) or mods/_standard/patcher/index_admin.php (aka Patcher) component.
CVSS 8.8
CVE-2019-12185 NOMISEC HIGH WORKING POC
eLabFTW 1.8.5 - Command Injection
eLabFTW 1.8.5 is vulnerable to arbitrary file uploads via the /app/controllers/EntityController.php component. This may result in remote command execution. An attacker can use a user account to fully compromise the system using a POST request. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.
CVSS 8.8
CVE-2019-18839 WRITEUP CRITICAL WORKING POC
FUDForum 3.0.9 - XSS
FUDForum 3.0.9 is vulnerable to Stored XSS via the nlogin parameter. This may result in remote code execution. An attacker can use a user account to fully compromise the system using a POST request. When the admin visits the user information, the payload will execute. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.
CVSS 9.0
CVE-2019-12169 METASPLOIT HIGH ruby WORKING POC
ATutor 2.2.4 - RCE
ATutor 2.2.4 allows Arbitrary File Upload and Directory Traversal, resulting in remote code execution via a ".." pathname in a ZIP archive to the mods/_core/languages/language_import.php (aka Import New Language) or mods/_standard/patcher/index_admin.php (aka Patcher) component.
CVSS 8.8
CVE-2019-18873 EXPLOITDB CRITICAL text WORKING POC
FUDForum 3.0.9 - Stored XSS
FUDForum 3.0.9 is vulnerable to Stored XSS via the User-Agent HTTP header. This may result in remote code execution. An attacker can use a user account to fully compromise the system via a GET request. When the admin visits user information under "User Manager" in the control panel, the payload will execute. This will allow for PHP files to be written to the web root, and for code to execute on the remote server. The problem is in admsession.php and admuser.php.
CVSS 9.0
CVE-2019-12185 EXPLOITDB HIGH python WORKING POC
eLabFTW 1.8.5 - Command Injection
eLabFTW 1.8.5 is vulnerable to arbitrary file uploads via the /app/controllers/EntityController.php component. This may result in remote command execution. An attacker can use a user account to fully compromise the system using a POST request. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.
CVSS 8.8