CVE-2023-30258
CRITICAL EXPLOITED NUCLEIMagnussolution Magnusbilling < 7.3.0 - Command Injection
Title source: ruleDescription
Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request.
Exploits (14)
nomisec
WRITEUP
12 stars
by AdityaBhatt3010 · poc
https://github.com/AdityaBhatt3010/TryHackMe-Room-Walkthrough-Billing
nomisec
WORKING POC
7 stars
by tinashelorenzi · remote
https://github.com/tinashelorenzi/CVE-2023-30258-magnus-billing-v7-exploit
nomisec
WORKING POC
1 stars
by kayl22 · remote
https://github.com/kayl22/magnus_billing_7.3.0_RCE_CVE-2023-30258
nomisec
WRITEUP
by cyb3rk0ala · poc
https://github.com/cyb3rk0ala/THM-MagnusBilling-CVE-2023-30258-Exploit
nomisec
WORKING POC
by estebanzarate · remote
https://github.com/estebanzarate/CVE-2023-30258-Magnus-Billing-v7-Command-Injection-PoC
nomisec
WORKING POC
by abdullohqurbon0v · remote
https://github.com/abdullohqurbon0v/CVE-2023-30258-Exploit-For-Magnus-Billing-System
metasploit
WORKING POC
EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/magnusbilling_unauth_rce_cve_2023_30258.rb
Nuclei Templates (1)
MagnusBilling - Remote Code Execution
CRITICALVERIFIEDby gy741,mananispiwpiw
Shodan:
http.html:"magnusbilling"
FOFA:
body="magnusbilling"
References (4)
Scores
CVSS v3
9.8
EPSS
0.9347
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-01-19
CWE
CWE-78
CWE-77
Status
published
Products (1)
magnussolution/magnusbilling
6.0.0 - 7.3.0
Published
Jun 23, 2023
Tracked Since
Feb 18, 2026