This is a technical writeup detailing an OS command injection vulnerability in 7 Sticky Notes v1.9. The exploit leverages the 'Alarms' feature to execute arbitrary commands, including reverse shells, by manipulating the 'Action' dropdown and 'For' field settings.
Classification
Writeup 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:7 Sticky Notes v1.9
No auth needed
Prerequisites:Access to the application's GUI · Ability to set alarms