The exploit demonstrates a command injection vulnerability in sumon <= 0.7.0, where user-controlled input via the 'host' or 'fichero_post' parameters is passed unsanitized to system commands (passthru/exec). Multiple endpoints (chg.php, stats.php, showfile.php, difffile.php) are vulnerable to remote command execution.
Classification
Working Poc 95%
Target:
sumon <= 0.7.0
No auth needed
Prerequisites:
Network access to the vulnerable sumon web interface