This Metasploit module exploits a command injection vulnerability in TeemIp versions prior to 2.4.0. The "new_config" parameter of "exec.php" allows you to create a new PHP file with the exception of config information. The malicious PHP code sent is executed instantaneously and is not saved on the server. The vulnerability can be exploited by an authorized user (Administrator). Module allows remote command execution by sending php payload with parameter 'new_config'.
from Files ≈ Packet Storm https://ift.tt/2CRB3Be
Post Top Ad
Thursday, 4 April 2019
TeemIp IPAM Command Injection
Tags
# Hacking files Files ≈ Packet Storm
Share This
About Latest ankit news
Hacking files Files ≈ Packet Storm
Subscribe to:
Post Comments (Atom)
Post Bottom Ad
Author Details
ANKIT CHAUDHARY is a blogger resources site is a provider of high quality blogger template with premium looking layout and robust design. The main mission of ANKIT CHAUDHARY is to provide the best quality blogger templates which are professionally designed and perfectlly seo optimized to deliver best result for your blog.
No comments:
Post a Comment